CFP last date
20 May 2024
Reseach Article

Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol

by Deepa Gupta, Harinder Kaur, Rakesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 11
Year of Publication: 2016
Authors: Deepa Gupta, Harinder Kaur, Rakesh Kumar
10.5120/ijca2016912550

Deepa Gupta, Harinder Kaur, Rakesh Kumar . Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol. International Journal of Computer Applications. 156, 11 ( Dec 2016), 1-5. DOI=10.5120/ijca2016912550

@article{ 10.5120/ijca2016912550,
author = { Deepa Gupta, Harinder Kaur, Rakesh Kumar },
title = { Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 11 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume156/number11/26750-2016912550/ },
doi = { 10.5120/ijca2016912550 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:02:18.394962+05:30
%A Deepa Gupta
%A Harinder Kaur
%A Rakesh Kumar
%T Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 11
%P 1-5
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

wireless sensor network has been used for data sensing and collection at a single point for decision making process. Attack comprising in WSN produced various issues in data transmission and data management. Sinkhole attack is a compromised attack in WSN that compromised nodes that advertises a shortest path for data transmission. In this paper a new approach has been purposed for detection of sinkhole compromised nodes available in the network. On the basis of simulation results we can see that purposed approach provides better results.

References
  1. Ahmad Salah S. “Detection of Sinkhole Attack in Wireless Sensor Networks”, IEEE International Conference on Space Science and Communication, 2013, pp. 361-365.
  2. A. Vijayalakshmi., “Mobile Agent Middleware Security for Wireless Sensor Networks” IEEE International Conference on Communication and Signal Processing, 2014, pp. 1669- 1673.
  3. Van dana B. Salve, “AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks”, IEEE International Conference on Electrical, Computer and Communication Technologies, 2015, pp. 1–7.
  4. Mohamed Guerroumi “Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink” IEEE International Conference on Information Technology, 2015, pp. 307- 313.
  5. Sheela, D. “A non-cryptographic method of sink hole attack detection in wireless sensor networks” IEEE International Conference on Information Technology, 2011, pp. 527–532.
  6. Guerroumi, M., “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink” IEEE International Conference on Information Technology - New Generations, 2015, pp. 307 – 313.
  7. Varshney, K.K. “Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network” IEEE International Conference on Information Communication and Embedded Systems, 2014, pp. 1–5.
  8. Ritwik Banerjee “Energy efficient routing and bypassing energy-hole through mobile sink in WSN” IEEE Conf. on Computer Communication and Informatics (ICCCI), 2014, pp. 1 – 6.
  9. Babar Nazir “Mobile Sink based Routing Protocol (MSRP) for Prolonging Network Lifetime in Clustered Wireless Sensor Network” IEEE Conf. on Computer Applications and Industrial Electronics (ICCAIE), 2010, pp. 624–629.
  10. Pushpendu Karet “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Trans faulty Nodes” IEEE Conf. on IEEE Transactions on Network and Service Management, 2016, pp. 99 – 112.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Sinkhole DSN TDMA and PDR