On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks

被引:0
|
作者
Ngai, Edith C. H. [1 ]
Liu, Jiangchuan [2 ]
Lyu, Michael R. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
[2] Simon Fraser Univ, Sch Comp Sci, Burnaby, BC V5A 1S6, Canada
基金
加拿大自然科学与工程研究理事会; 加拿大创新基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a wireless sensor network, multiple nodes would send sensor readings to a base station for further processing. It is well-known that such a many-to-one communication is highly vulnerable to the sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and then performs selective forwarding or alters the data passing through it. A sinkhole attack forms a serious threat to sensor networks, particularly considering that such networks are often deployed in open areas and of weak computation and battery power. In this paper, we present a novel algorithm for detecting the intruder in a sinkhole attack. The algorithm first finds a list of suspected nodes, and then effectively identifies the intruder in the list through a network flow graph. The algorithm is also robust to deal with cooperative malicious nodes that attempt to hide the real intruder. We have evaluated the performance of the proposed algorithm through both numerical analysis and simulations, which confirmed the effectiveness and accuracy of the algorithm. Our results also suggest that its communication and computation overheads are reasonably low for wireless sensor networks.
引用
收藏
页码:3383 / 3389
页数:7
相关论文
共 50 条
  • [1] Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side
    Krontiris, Ioannis
    Giannetsos, Thanassis
    Dimitriou, Tassos
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 526 - 531
  • [2] Detection of Sinkhole Attack in Wireless Sensor Networks
    Salehi, Ahmad S.
    Razzaque, M. A.
    Naraei, Parisa
    Farrokhtala, Ali
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, : 361 - 365
  • [3] A Sinkhole Attack Detection Scheme in Mintroute Wireless Sensor Networks
    Rassam, Murad A.
    Zainal, Anazida
    Maarof, Mohd. Aizaini
    Al-Shaboti, Mohammed
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATION TECHNOLOGIES (ISTT), 2012, : 71 - 75
  • [4] An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
    Ngai, Edith C. H.
    Liu, Jiangchuan
    Lyu, Michael R.
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2353 - 2364
  • [5] Sinkhole attack detection and avoidance mechanism for RPL in wireless sensor networks
    Jamil, Ansar
    Ali, Mohammed Qassim
    Abd Alkhalec, Muhammed E.
    [J]. Annals of Emerging Technologies in Computing, 2021, 5 (Special issue 5) : 94 - 101
  • [6] Sinkhole attack detection based on redundancy mechanism in wireless sensor networks
    Zhang, Fang-Jiao
    Zhai, Li-Dong
    Yang, Jin-Cui
    Cui, Xiang
    [J]. 2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014, 2014, 31 : 711 - 720
  • [7] Detection of Sinkhole Attack in Wireless Sensor Network
    Raju, Imandi
    Parwekar, Pritee
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 629 - 636
  • [8] Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks
    Sreelaja, N. K.
    Pai, G. A. Vijayalakshmi
    [J]. APPLIED SOFT COMPUTING, 2014, 19 : 68 - 79
  • [9] Detection and Defence of Sinkhole Attack in Wireless Sensor Network
    Jin Qi
    Tang Hong
    Kuang Xiaohui
    Liu Qiang
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 809 - 813
  • [10] Detection and Mitigation of Sinkhole Attack in wireless sensor network
    Kaur, Manpreet
    Singh, Amarvir
    [J]. 2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 217 - 221