Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Energy Efficient and Reliable Algorithm to Detect and Resolve Sinkhole Attack over Collection Tree Protocol

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Maya Shelke, Kalyani Kadam, Ameya Bhattacharya, Richita Das, Ayushi Rathi, Aishwarya Singh
10.5120/ijca2016911327

Maya Shelke, Kalyani Kadam, Ameya Bhattacharya, Richita Das, Ayushi Rathi and Aishwarya Singh. Energy Efficient and Reliable Algorithm to Detect and Resolve Sinkhole Attack over Collection Tree Protocol. International Journal of Computer Applications 148(12):38-41, August 2016. BibTeX

@article{10.5120/ijca2016911327,
	author = {Maya Shelke and Kalyani Kadam and Ameya Bhattacharya and Richita Das and Ayushi Rathi and Aishwarya Singh},
	title = {Energy Efficient and Reliable Algorithm to Detect and Resolve Sinkhole Attack over Collection Tree Protocol},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2016},
	volume = {148},
	number = {12},
	month = {Aug},
	year = {2016},
	issn = {0975-8887},
	pages = {38-41},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume148/number12/25812-2016911327},
	doi = {10.5120/ijca2016911327},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Wireless sensor networks (WSNs) have gained huge popularity in various new fields. The direct use of each of these sensors individually is to detect its surrounding conditions such as temperature, pressure, sound, motion etc. whereas a collection of such nodes finds application in various large scale management systems such as healthcare, disaster and traffic management programs. In most of these systems, the sensors are located at points which are not physically protected and can hence fall prey to several security threats and attacks very easily. The limited memory, power and capacity of such sensors make it more difficult to introduce advanced, heavy-weight algorithms for securing them against such attacks. Further, the criticality of the applications using WSN makes such security threats more dangerous. In this paper, we show the results of combining a novel detection algorithm with the results of a unique resolution technique of the sinkhole attack when the network is routed using Collection Tree Protocol (CTP).

References

  1. Shishir Sharma and Gajendra Singh Chandel, “A Review of Pairwise of Key Establishment Techniques for Wireless Sensor Networks”, International Journal of Science and Research, 2003.
  2. Government Health Staff, “Internet of Things triggers healthcare security concerns”, Government Health IT, 2015
  3. Jun Shang, et al., “Improvement of approach to detect sinkhole attacks in Wireless Sensor Networks”, Intelligent Computing and Education Technology, pp 695
  4. Omprakash Gnawali, et al., “Collection Tree Protocol”.
  5. Ioannis Krontiris, et al., “Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks”, 2007.
  6. Anthonis Papadimitriou, et al., “Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks”, IEEE, 2009.
  7. Yong Wang, et al., “An Efficient Scheme for Removing Compromised Sensor Nodes from Wireless Sensor Networks”, CSE Technical Reports, 2007.
  8. Qiang Wang, et al., “Reprogramming Wireless Sensor Networks: Challenges and Approaches”, IEEE, 2006.

Keywords

Wireless Sensor Network (WSN), Collection Tree Protocol (CTP), Sinkhole Attack, Base Station (BS), Cluster Head (CH), Sensor, Internet of Things (IoT)