Abstract

Wireless sensor networks (WSN’s) comprise limited energy small sensor nodes having the ability to monitor the physical conditions and communicate information among the various nodes without requiring any physical medium. Over the last few years, with the rapid advancements in information technology, there has been an increasing interest of various organizations in making the use of wireless sensor networks (WSN’s). The sensor nodes in WSN having limited energy detects an event, collect data and forward this collected data to the base node, called sink node, for further processing and assessment. Few attributes of WSN’s like the energy consumption and lifetime can be impacted by the design and placement of the Sink node. Despite various useful characteristics WSN’s is being considered vulnerable and unprotected. There is a large class of various security attacks that may affect the performance of the system among which sinkhole an adversary attack puts dreadful threats to the security of such networks. Out of various attacks, a sinkhole attack is one of the detrimental types of attacks that brings a compromised node or fabricated node in the network which keeps trying to lures network traffic by advertising its wrong and fake routing update. Sinkhole attacks may have some other serious harmful impacts to exploit the network by launching few other attacks. Some of these attacks are forwarding attacks, selective acknowledge spoofing attacks, and they may drop or modify routing information too. It can also be used to send fake or false information to the base station. This study is analyzing the challenges with sinkhole attacks and exploring the existing available solutions by surveying comparatively which used to detect and mitigate sinkhole attacks in the wireless sensor network.

Highlights

  • A wireless sensor network refers to a group of the number of small nodes capable to perform sensing and send data to the base station [1]

  • Based on existing and currently being used work this research has found that most researchers have been striving to look for ICT solutions for Wireless sensor network (WSN) related problems identifying, detecting, and providing the resistance-oriented solution to sinkhole attacks in a working wireless network

  • Different researchers and analyzers had presented and shown several ways of intrusion detection proposals based on different methods with various versatile approaches to expose and identify the vicious sinkhole nodes

Read more

Summary

INTRODUCTION

A wireless sensor network refers to a group of the number of small nodes capable to perform sensing and send data to the base station [1]. It is found that most of the wireless networks are deployed and working in notfriendly and not secured areas and normally left open unattended in an unsecured environment Most of their frequent use routing protocols don’t consider or attend the security aspect due to resource constraints and limitations which contain low memory, low computational power, storage capacity low power supply, and low communication range [3]. A sinkhole attack tries to prevent the network base station from receiving complete and precise sensing data from nodes. MintRoute protocol in the process of routing uses link quality as a metric in a way to select the optimal and best route to send the packet to the network base station [18]

Sinkhole Attack in TinyAODV Protocol
CHALLENGES IN THE DETECTION OF
Unpredictable Nature of Sinkhole Attack
Insider Attack
Resource restriction
Physical Attack
EXISTING APPROACHES
Rule-based
Anomaly-based Detection
Probabilistic approach
Fuzzy Rule-based
Agent-based
2017 Probabilistic procedure
2011 Anomalybased procedure
Findings
CONCLUSION AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call