Hash Based Sinkhole Attack Detection Scheme For Wireless Sensor Networks
نویسنده
چکیده
This paper investigates one of the most severe routing attacks in sensor networks, namely sinkhole attack. A compromised node tries to draw all or as much traffic as possible from a particular area, by making it look attractive to the surrounding nodes with respect to the underlying routing metric. The detection of sinkhole attack in wireless sensor networks is proposed using an enhanced double davismayer scheme that utilizes both SHA and MD5 algorithms for producing the digest of a message that is ready for transmission. The compromised nodes are identified by transmitting the message in two paths; one is advertised routing path and actual routing path. The digest transmitted in both the paths must be same if the network is not affected by the compromised nodes otherwise the advertising node is suspected as compromised node. The functionality of the proposed algorithm is tested in MATLAB and is evaluated in terms of complexity of collision attack and collision resistance. The feasibility of the proposed scheme in senor nodes are checked by the simulating the same in hardware in Xilinx. KeywordsMessage Digest Algorithm, sinkhole attack, wireless sensor networks, VHDL
منابع مشابه
Survey of Detection of Sinkhole Attack in Wireless Sensor Network
Wireless Sensor Network (WSN) is emerging as a prevailing technology due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor network such as selective forwarding, ja...
متن کاملIntrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks
Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...
متن کاملMollifying the Effect of Cloning, Sink Hole and Black Hole Attacks in Wireless Sensor Networks using Mobile Agents with Several Base Stations
Three dangerous attacks in wireless sensor network is handled in this proposed security solution. This paper proposes a lightweight and fast mobile agent technology based security solution against cloning attack, sinkhole attack and black hole attack for wireless sensor networks (WSNs).Recently mobile agents have been proposed in wireless sensor networks to reduce the communication cost especia...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملSwarm intelligence based approach for sinkhole attack detection in wireless sensor networks
Swarm intelligence, a nature inspired computing applies an algorithm situated within the context of agent based models that mimics the behavior of ants to detect sinkhole attacks in wireless sensor networks. An Ant Colony Optimization Attack Detection (ACO-AD) algorithm is proposed to identify the sinkhole attacks based on the nodeids defined in the ruleset. The nodes generating an alert on ide...
متن کامل