Analysis of AODV protocol under sinkhole attack in wireless sensor network

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sinkhole attack is one of the security attacks which try to disturb the ongoing communication in wireless sensor network. In sinkhole attack, the intruder or the malicious node try to attract the network traffic towards itself, that sensor nodes will pass data packets through this compromised node thereby manipulating messages which sensor nodes are transferring to the base station. In this paper we analyze the impact of Sinkhole attack on AODV protocol under various conditions. We analyzed the impact of Sinkhole attack on AODV protocol with varying number of attacker nodes.

     

     


  • Keywords


    Sinkhole Attack; Wireless Sensor Network; AODV.

  • References


      [1] G. Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks,” Int. J. Comput. Sci. Inf. Secur., vol. 4, no. 1, pp. 1–9, 2009.

      [2] T. Kavitha and D. Sridharan, “Security Vulnerabilities in Wireless Sensor Networks : A Survey,” J. Inf. Assur. Secure. vol. 5, pp. 31–44, 2010.

      [3] T. Singh, “Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool,” Int. J. Adv. Comput. Sci. Appl., vol. 4, no. 2, pp. 32–35, 2013.

      [4] A. Tayebi, S. Berber, and A. Swain, “Wireless Sensor Network Attacks:An Overview and Critical Analysis,” in Seventh International Conference on Sensing Technology Wireless, 2013, pp. 97–102

      [5] K. Xing, R. S. S. Srinivasan, M. Rivera, J. Li, and X. Cheng, “Attacks and Countermeasures in Sensor Networks : A Survey,” in Network Security, S. C.-H. Huang, D. MacCallum, and D.-Z. Du, Eds. Boston, MA: Springer US, 2005, pp. 251–272.

      [6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2–3, pp. 293–315, 2003.

      [7] H. M. Sun, C. M. Chen, and Y. C. Hsiao, “An efficient countermeasure to the selective forwarding attack in wireless sensor networks,” in IEEE Region 10 Annual International Conference, TENCON 2007, 2007, pp. 4–7.

      [8] S. Chen, G. Yang, and S. Chen, “A security routing mechanism against Sybil attack for wireless sensor networks,” in 2010 International Conference on Communications and Mobile Computing (CMC 2010), 2010, pp. 142–146.

      [9] K. Tunwal, R. Khandelwal, D. Acharya, and P. S. Dabi, “A Survey of Sinkhole-Based Attack and Detection Techniques in WSN,” Int. J. Enhanc. Res. Sci. Technol. Eng., vol. 3, no. 6, pp. 377–380, 2010.

      [10] A. Gupta and A. K. Gupta, “A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks,” vol. 14, no. 1, 2014.

      [11] S. D. Roy, S. A. Singh, S. Choudhury, and N. C. Debnath, “Countering sinkhole and black hole attacks on sensor networks using dynamic trust management,” in Proceedings -of IEEE Symposium on Computers and Communications, 2008, pp. 537–542.

      [12] C. Lin, “AODV Routing Implementation for Scalable Wireless Ad-Hoc Network Simulation (SWANS).”

      [13] C. Chen, M. Song, and G. Hsieh, “Intrusion detection of sinkhole attacks in large-scale wireless sensor networks,” in IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), 2010, pp. 711–716.

      [14] M. A. Rassam, A. Zainal, and M. Al-shaboti, “A Sinkhole Attack Detection Scheme in Mintroute Wireless Sensor Networks,” in 1st IEEE International Symposium on Telecommunication Technologies, 2012, pp. 71–75.

      [15] J. A. Chaudhry, U. Tariq, M. A. Amin, and R. G. Rittenhouse, “Dealing with Sinkhole Attacks in Wireless Sensor Networks,” Adv. Sci. Technol. Lett., vol. 29, no. 2, pp. 7–12, 2013.

      [16] G. Kibirige and C. Sanga, “A Survey on Detection of Sinkhole Attack in Wireless Sensor Network,” Int. J. Comput. Sci. Inf. Secur., vol. 13, no. 5, pp. 1–9, 2015.

      [17] D. Dallas, C. Leckie, and K. Ramamohanarao, “Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks,” in Proceedings of the15th IEEE International Conference on Networks, 2007.

      [18] Preeti, Yogesh Chaba, Yudhvir Singh; Review of Detection and Prevention Policies for DDoS attacks in MANETs; In Proceedings of 2nd National Conference on Challenges & Opportunities in Information Technology (COIT-2008) RIMT-IET, Mandi Gobindgarh; March 29, 2008; pp 56-59.

      [19] Neeraj Sharma, B.L. Raina, Prabha Rani, Yogesh Chaba, Yudhvir Singh,“Attack Prevention Methods for DDoS Attacks in MANETs”, Asian Journal Of Computer Science And Information Technology, ISSN – 2249-5126,Vol 1, Issue 1, pp. 18 – 21 (2011).

      [20] Yogesh Chaba, Yudhvir Singh, Aarti, “Performance Analysis of Scalability and Mobility on Routing Protocols in MANETs” International Journal of IT & Knowledge Management (ISSN: 0973-4414) Vol. 1, No. 2, pp. 327-336 (July-Dec, 2008).

      [21] VikashSiwach,Yudhvir Singh, Seema,DheerDhwaj Barak, “An approach to optimize QoS routing protocol using genetic algorithm in MANET”, IJCSMS, ISSN: 2231-5268, Vol 12, Issue 3, pp 149-53, (Sept 2012).

      [22] RenuDalal, Manju Khari, Yudhvir Singh, “Survey of Trust Schemes on Ad-hoc Network”, Springer - Lecture Notes of the Institute for Computer Sciences, Social Informatics & Telecommunications Engineering (LNICST) Series 84, Springer, NETCOM-3, CCSIT-2012,pp 170-180,(2012).

      [23] Pooja, Manisha, Yudhvir Singh, “Security Issues and Sybil Attack inWireless Sensor Networks”, International Journal of P2P Network Trends and Technology,ISSN: 2249-2615, Volume3, Issue1, pp7-13, 2013


 

View

Download

Article ID: 13028
 
DOI: 10.14419/ijet.v7i2.4.13028




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.