This Article Statistics
Viewed : 2445 Downloaded : 1902


A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

Merve Nilay Aydın* , İpek Abasıkeleş Turgut

DOI: 10.28978/nesciences.348325


Wireless Sensor Networks is consist of thousands of small and low-cost devices, which communicate over wireless medium. Due to locating in harsh environment and having limited resources, WSN is prone to various attacks. One of the most dangerous attacks threatening WSN is the sinkhole attack. In this paper, sinkhole attack is modelled on a cluster-based WSN, and a centralized detection algorithm based on the remaining energies of the nodes is proposed. The simulations were run for different values of energy thresholds and various numbers of nodes. The performance of the system was investigated over total energy consumption in the system, the number of packets arrived at base station and true detection rate of the sinkhole node(s). The results showed that the proposed method is energy-efficient and detects the malicious nodes with a 100% accuracy for all number of nodes.


Wireless sensor networks, security, sinkhole, intrusion detection, LEACH

Download full text   |   How to Cite   |   Download XML Files

  • Abasikeleş-Turgut, I., Aydin, M. N., & Tohma, K. (2016). A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs.International Journal of Electronics and Electrical Engineering. Vol. 4, No. 1., 74-78.
  • Aydın, M. N., Tohma, K., & Turgut, İ. A. (2015). Modelling black hole attacks on cluster-based wireless sensor networks. In Signal Processing and Communications Applications Conference (SIU), 23th (pp. 236-239). IEEE.
  • Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S. H., & Sadeghi, S. (2012). A Novel Algorithm for Detecting Sinkhole Attacks in WSNs. International Journal of Computer Theory and Engineering, 4(3), 418-421.
  • Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
  • Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2013). Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 29, 7-12.
  • Chen, C., Song, M., & Hsieh, G. (2010, June). Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 711-716). IEEE.
  • Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 3(2), 149-152.
  • Han, G., Li, X., Jiang, J., Shu, L., & Lloret, J. (2014). Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. The Computer Journal, bxu036.
  • Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. InSystem sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
  • Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353-2364.
  • Papadimitriou, A., Le Fessant, F., Viana, A. C., & Sengul, C. (2009, October). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on (pp. 43-48). IEEE.
  • Patil, S. S., & Khanagoudar, P. S. (2012). Intrusion Detection Based Security Solution for Cluster Based WSN. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(4), pp-331.
  • Radhikabaskar, D. P., Komara, S., & Paul, V. (2014) Sinkhole Attack Detection In Hierarchical Sensor Networks. International Journal of Scientific & Engineering Research, Volume 5, Issue 9.
  • Sharmila, S., & Umamaheswari, G. (2011, July). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In Process Automation, Control and Computing (PACC), 2011 International Conference on(pp. 1-6). IEEE.
  • Singh, S. K., Singh, M. P., & Singh, D. K. (2011). Intrusion detection based security solution for cluster-based wireless sensor networks. International Journal of Advanced Science and Technology, 30(83).
  • Tohma, K., Aydın, M. N., & Turgut, İ. A. (2015, May). Improving the LEACH protocol on wireless sensor network. In Signal Processing and Communications Applications Conference (SIU), 2015 23th (pp. 240-243). IEEE.
  • Varga, Andras.(2010), OMNeT++. Modeling and Tools for Network Simulation: 35-59.
  • Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: a survey. In Network security (pp. 251-272). Springer US.