Abstract

WSN is one of the modern networks that use technologies and applications in public places. It consists of hundreds and thousands of tiny sensor nodes scattered in the network and has limited scope and range resources connected to the base stations. The specifications of these nodes are low cost and low energy and used for monitoring purposes. Since the sensors are small and many, it is easy to attack these networks. Therefore, there will be many potential attacks on the network of sensors, and among these attacks are jamming, sinkhole, eavesdropping, and other attacks. The sinkhole attack is the most attack that works to destroy paths by announcing the update of the fake routing related to it; the attack occurs through the compromised node (the malicious node) So that it announces a file containing the routing information and works to attract the rest of the nodes to do this routing the data towards it and then operating the sphere of influence. One of the effects of this attack is to reduce the overall network performance, and it can also be used to make another attack, such as a selective redirection attack and a spoofing attack. This paper aims to analyze and detect sinkhole attacks in wireless sensor networks.

Highlights

  • WSNs are used in most applications in indoor or outdoor locations [4]

  • WSN networks are considered more Impact of security attacks depending on the type of transmission in the transmission medium in wireless networks, so that often there are dangerous environments in which the contract is made, so that there is no physical protection, and this will lead to its risk and reduce its security

  • A packet called route replay (RREP) contains all the information and nodes that were during the transmission path from beginning to end, starting from the last node and back to the same path sent until it reaches the nodes A

Read more

Summary

INTRODUCTION

WSNs are used in most applications in indoor or outdoor locations [4]. Through the transmission of data and information in the network and most importantly, providing security for it. [6] Security is one of the most difficult things in WSN as it is always difficult to monitor the sensor nodes/network every time. Through the transmission of data and information in the network and most importantly, providing security for it. There are a lot of complex sensor limitations, especially for its size and cost, which must be at least one These restrictions lead to a very small memory size, a relatively limited power source, and a limited transmission area as well. There are layers designed in WSN networks that help protect the sensor from multiple attacks. WSN networks are considered more Impact of security attacks depending on the type of transmission in the transmission medium in wireless networks, so that often there are dangerous environments in which the contract is made, so that there is no physical protection, and this will lead to its risk and reduce its security. Maghrib Abidalreda Maky Alrammahi et al, International Journal of Advanced Research in Computer Science, 12 (5), September-October 2021,1-6

PREVIEW OF AODV PROTOCOL
OBJECTIVE
Attack of Sinkhole
Simulation Sinkhole Attack
Configuration
Detecting and Identifying Attack
CONCLUSION AND FUTURE WORKS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.