Detection of sinkhole attack in wireless sensor networks
Salehi Shahraki, Ahmad, Razzaque, M.A., Naraei, Parisa, & Farrokhtala, Ali (2013) Detection of sinkhole attack in wireless sensor networks. In IEEE International Conference on Space Science and Communication (IconSpace), IEEE, Melaka, pp. 361-365.
Generally wireless sensor networks rely of many-to-one communication approach for data gathering. This approach is extremely susceptible to sinkhole attack, where an intruder attracts surrounding nodes with unfaithful routing information, and subsequently presents selective forwarding or change the data that carry through it. A sinkhole attack causes an important threat to sensor networks and it should be considered that the sensor nodes are mostly spread out in open areas and of weak computation and battery power. In order to detect the intruder in a sinkhole attack this paper suggests an algorithm which firstly finds a group of suspected nodes by analyzing the consistency of data. Then, the intruder is recognized efficiently in the group by checking the network flow information. The proposed algorithm's performance has been evaluated by using numerical analysis and simulations. Therefore, accuracy and efficiency of algorithm would be verified.
Impact and interest:
Citation counts are sourced monthly from and citation databases.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||Wireless Sensor Network, Sinkhole Attack, Intruder Detection, security in wireless sensor networks, Detection of sinkhole attack|
|Divisions:||Past > Institutes > Information Security Institute
Current > QUT Faculties and Divisions > Science & Engineering Faculty
|Copyright Owner:||Copyright 2013 IEEE|
|Copyright Statement:||Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.|
|Deposited On:||02 Mar 2015 23:01|
|Last Modified:||18 Jun 2016 16:24|
Repository Staff Only: item control page