Sinkhole Attack Detection in Wireless Sensor Nodes
Sinkhole Attack Detection in Wireless Sensor Nodes
Index Terms— Wireless Sensor Nodes, Sinkhole attack, hop count, sequence number, Adjacency matrix
II.BACKGROUND INFORMATION
Wireless Sensor Network is affected by different kinds
of attacks, given below are common attacks in WSN: 2.1.3 Sinkhole Attack
A. Attacks on WSN In Sinkhole attack, the attacker node attracts the traffic
and neighbouring nodes in the network with respective to
There are several security threats in WSN; these the routing algorithm. This attack leads to selective
attacks affect the network layer. Few attacks are forwarding or wormhole attack. The neighbouring nodes
explained here: are attracted by the high quality link provided to reach base
station by the malicious node. Nodes in the network send
the packets through this attacker node. Due to this, the
2.1.1 Sybil Attack sequence number of the attacker node is increased. The
node drops the collected packets instead of forwarding it to
In this attack, the infected node can be in any place. the base station.
This node can have multiple identities. It can be classified
as direct vs indirect communication, fabricated vs stolen III. RELATED WORK
identities, simultaneity. Distributed storage, routing, data In this section we take overlook at some of the related
aggression, voting, fair resource allocation, misbehaviour work which has already done in this field.
1
In [1], Wireless sensor network security attacks are iv. Extract the last octa digit of source and
discussed in this paper. It provides short notes on destination IP address
security goals and challenges. It gives brief information v. If source and destination IP address are same and
about various kinds of attacks like Sinkhole attack, hop count zero
Wormhole attack, Sybil attack and its counter then do nothing
measures. else
a) If the position in matrix for that IP address is
0 then insert the respective hop count and
In [2], the paper explains about Black hole attack
sequence number
and uses Watchdog technique. In which each node hear b) If hop count matches and sequence number is
the neighboring node communication. A cluster head is less than the previously recorded number then
appointed for monitoring the data traffic in a network. change it
They have used hop count and sequence number to find c) If hop count is less than previously recorded
malicious node and there is a possibility that the cluster number and not equal to zero then store the
head, itself acts as an attacker node. new number
Repeat from step 5 until end of file.
In [3], the paper deals with a novel algorithm for
detecting the sinkhole attacks in WSNs. They have Algorithm to detect the sinkhole :
discussed about sinkhole attack and described system
model and energy consumption. Three situations are Labe1;
discussed, i) arrival of data at Base Station (BS) If (Hopcount =1 and sequence number = Max)
properly ii) while manipulated, and data arrive at base Option=1;
station iii) data never arrives at BS. If ii) and iii) Else
situation occurs, it looks for malicious node. The BS Option=0;
checks and compares the path of the node each time in
If (Option=1)
its memory with new path and detects the malicious
“It is malicious node”;
node. Else
“goto Label”;
IV. PROPOSED WORK
References
Figure 3: Extracted csv file (input file) Manish M Patel, Akshai Aggarwal (2013) : Security
Attacks in Wireless Sensor Networks: A Survey.
International Conference on Intelligent Systems and Signal
Processing (ISSP).