Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol
![]() |
10.5120/ijca2016912550 |
Deepa Gupta, Harinder Kaur and Rakesh Kumar. Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol. International Journal of Computer Applications 156(11):1-5, December 2016. BibTeX
@article{10.5120/ijca2016912550, author = {Deepa Gupta and Harinder Kaur and Rakesh Kumar}, title = {Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol}, journal = {International Journal of Computer Applications}, issue_date = {December 2016}, volume = {156}, number = {11}, month = {Dec}, year = {2016}, issn = {0975-8887}, pages = {1-5}, numpages = {5}, url = {http://www.ijcaonline.org/archives/volume156/number11/26750-2016912550}, doi = {10.5120/ijca2016912550}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
wireless sensor network has been used for data sensing and collection at a single point for decision making process. Attack comprising in WSN produced various issues in data transmission and data management. Sinkhole attack is a compromised attack in WSN that compromised nodes that advertises a shortest path for data transmission. In this paper a new approach has been purposed for detection of sinkhole compromised nodes available in the network. On the basis of simulation results we can see that purposed approach provides better results.
References
- Ahmad Salah S. “Detection of Sinkhole Attack in Wireless Sensor Networks”, IEEE International Conference on Space Science and Communication, 2013, pp. 361-365.
- A. Vijayalakshmi., “Mobile Agent Middleware Security for Wireless Sensor Networks” IEEE International Conference on Communication and Signal Processing, 2014, pp. 1669- 1673.
- Van dana B. Salve, “AODV Based Secure Routing Algorithm against Sinkhole Attack in Wirelesses Sensor Networks”, IEEE International Conference on Electrical, Computer and Communication Technologies, 2015, pp. 1–7.
- Mohamed Guerroumi “Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink” IEEE International Conference on Information Technology, 2015, pp. 307- 313.
- Sheela, D. “A non-cryptographic method of sink hole attack detection in wireless sensor networks” IEEE International Conference on Information Technology, 2011, pp. 527–532.
- Guerroumi, M., “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink” IEEE International Conference on Information Technology - New Generations, 2015, pp. 307 – 313.
- Varshney, K.K. “Performance analysis of malicious nodes in IEEE 802.15.4 based wireless sensor network” IEEE International Conference on Information Communication and Embedded Systems, 2014, pp. 1–5.
- Ritwik Banerjee “Energy efficient routing and bypassing energy-hole through mobile sink in WSN” IEEE Conf. on Computer Communication and Informatics (ICCCI), 2014, pp. 1 – 6.
- Babar Nazir “Mobile Sink based Routing Protocol (MSRP) for Prolonging Network Lifetime in Clustered Wireless Sensor Network” IEEE Conf. on Computer Applications and Industrial Electronics (ICCAIE), 2010, pp. 624–629.
- Pushpendu Karet “Reliable and Efficient Data Acquisition in Wireless Sensor Networks in the Presence of Trans faulty Nodes” IEEE Conf. on IEEE Transactions on Network and Service Management, 2016, pp. 99 – 112.
Keywords
WSN, Sinkhole, DSN, TDMA and PDR