<

This Article Statistics
Viewed : 797 Downloaded : 615


 

A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

Merve Nilay Aydın* , İpek Abasıkeleş Turgut

DOI: 10.28978/nesciences.348325

Keywords

Wireless sensor networks, security, sinkhole, intrusion detection, LEACH

Download full text   |   How to Cite   |   Download XML Files

References
  • Abasikeleş-Turgut, I., Aydin, M. N., & Tohma, K. (2016). A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs.International Journal of Electronics and Electrical Engineering. Vol. 4, No. 1., 74-78.
  • Aydın, M. N., Tohma, K., & Turgut, İ. A. (2015). Modelling black hole attacks on cluster-based wireless sensor networks. In Signal Processing and Communications Applications Conference (SIU), 23th (pp. 236-239). IEEE.
  • Bahekmat, M., Yaghmaee, M. H., Yazdi, A. S. H., & Sadeghi, S. (2012). A Novel Algorithm for Detecting Sinkhole Attacks in WSNs. International Journal of Computer Theory and Engineering, 4(3), 418-421.
  • Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
  • Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2013). Dealing with Sinkhole Attacks in Wireless Sensor Networks. Advanced Science and Technology Letters, 29, 7-12.
  • Chen, C., Song, M., & Hsieh, G. (2010, June). Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. In Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on (pp. 711-716). IEEE.
  • Gondwal, N., & Diwaker, C. (2013). Detecting blackhole attack in WSN by check agent using multiple base stations. American International Journal of Research in Science, Technology, Engineering & Mathematics, 3(2), 149-152.
  • Han, G., Li, X., Jiang, J., Shu, L., & Lloret, J. (2014). Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks. The Computer Journal, bxu036.
  • Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000, January). Energy-efficient communication protocol for wireless microsensor networks. InSystem sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (pp. 10-pp). IEEE.
  • Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353-2364.
  • Papadimitriou, A., Le Fessant, F., Viana, A. C., & Sengul, C. (2009, October). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In Secure Network Protocols, 2009. NPSec 2009. 5th IEEE Workshop on (pp. 43-48). IEEE.
  • Patil, S. S., & Khanagoudar, P. S. (2012). Intrusion Detection Based Security Solution for Cluster Based WSN. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(4), pp-331.
  • Radhikabaskar, D. P., Komara, S., & Paul, V. (2014) Sinkhole Attack Detection In Hierarchical Sensor Networks. International Journal of Scientific & Engineering Research, Volume 5, Issue 9.
  • Sharmila, S., & Umamaheswari, G. (2011, July). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In Process Automation, Control and Computing (PACC), 2011 International Conference on(pp. 1-6). IEEE.
  • Singh, S. K., Singh, M. P., & Singh, D. K. (2011). Intrusion detection based security solution for cluster-based wireless sensor networks. International Journal of Advanced Science and Technology, 30(83).
  • Tohma, K., Aydın, M. N., & Turgut, İ. A. (2015, May). Improving the LEACH protocol on wireless sensor network. In Signal Processing and Communications Applications Conference (SIU), 2015 23th (pp. 240-243). IEEE.
  • Varga, Andras.(2010), OMNeT++. Modeling and Tools for Network Simulation: 35-59.
  • Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: a survey. In Network security (pp. 251-272). Springer US.