M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks

被引:0
|
作者
Zhaohui Zhang
Sanyang Liu
Yiguang Bai
Yalin Zheng
机构
[1] Xidian University,School of Mathematics and Statistics
来源
Cluster Computing | 2019年 / 22卷
关键词
Wireless sensor networks; Sinkhole attack; Node detection; Dynamic programming;
D O I
暂无
中图分类号
学科分类号
摘要
Sinkhole malicious nodes attacks are quite hard to handle in wireless sensor networks, due to the reason that the results of the attacks may cut off the communications by spreading false hops, absorbing data packets. Those terrible attacks are formed from the unique destroying method, which will preferentially destroy the nodes with higher communication function and shorter distance from the Sink node (Base station). In this paper, we propose a secure and energy-efficient detection scheme which can detect the malicious nodes more precisely than the traditional methods. In particularly, a new measure method is introduced in this paper, which is the frequency of each node by establishing M routes with optimal hops from per node to the Sink node. Using the proposed measure and dynamic programming, the malicious nodes can easily tell apart from the network according to the various satisfaction levels and hop difference. Compared with the traditional algorithms, simulation results show that our scheme can significantly promote the detection rate and the false positive rate. The detection rate increased about by 6–30%, the false positive rate decreased about by 5–25%. We also obtain a high energy-saving results in wireless sensor networks.
引用
收藏
页码:7677 / 7685
页数:8
相关论文
共 50 条
  • [1] M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks
    Zhang, Zhaohui
    Liu, Sanyang
    Bai, Yiguang
    Zheng, Yalin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S7677 - S7685
  • [2] Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks
    Dallas, Daniel
    Leckie, Christopher
    Ramamohanarao, Kotagiri
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 132 - 137
  • [3] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Rehman, Aqeel-ur
    Rehman, Sadiq Ur
    Raheem, Haris
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (04) : 2291 - 2313
  • [4] Sinkhole Attacks in Wireless Sensor Networks: A Survey
    Aqeel-ur Rehman
    Sadiq Ur Rehman
    Haris Raheem
    Wireless Personal Communications, 2019, 106 : 2291 - 2313
  • [5] Detection and mitigation of sinkhole attacks in wireless sensor networks
    Shafiei, H.
    Khonsari, A.
    Derakhshi, H.
    Mousavi, P.
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) : 644 - 653
  • [6] Intrusion detection of sinkhole attacks in wireless sensor networks
    Krontiris, Ioannis
    Dimitriou, Tassos
    Giannetsos, Thanassis
    Mpasoukos, Marios
    ALGORITHMIC ASPECTS OF WIRELESS SENSOR NETWORKS, 2008, 4837 : 150 - 161
  • [7] Detecting wormhole attacks in wireless sensor networks
    Xu, Yurong
    Chen, Guanling
    Ford, James
    Makedon, Fillia
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 267 - +
  • [8] Detecting Sinkhole Attacks in IoT-Based Wireless Sensor Networks Using Distance From Base Station
    Mondal, Koushik
    Yadav, Satyendra Singh
    Pal, Vipin
    Singh, Akhilendra Pratap
    Yogita, Yogita
    Singh, Mangal
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2022, 13 (06)
  • [9] Localization and Detection of Sinkhole Attacks in Wireless Sensor Networks Based on Denial of Service (DoS) Attacks
    Mona, R.
    Manoranjitham, R.
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 195 - 204
  • [10] Intrusion Detection of Sinkhole Attacks in Large-scale Wireless Sensor Networks
    Chen, Changlong
    Song, Min
    Hsieh, George
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 711 - +