scholarly journals Detection and Isolation Technique for Sinkhole Attack in WSN

2021 ◽  
Vol 23 (10) ◽  
pp. 381-390
Author(s):  
Urvashi Dhaked ◽  
◽  
Dr. Ashok Kumar ◽  
Dr. Brajesh Kumar Singh ◽  
◽  
...  

The WSN is a self-configuring network in which no centralized control is available. The sensing devices are considered as the nodes. These nodes have small size and low-cost. Primarily, the deployment of these networks is done in the military areas in order to monitor the activities of conflicting sides. These networks can monitor all the movement of energy. Malicious nodes can also join the network and trigger different types of active & passive attacks. The major kind of active attack is sinkhole intrusion. Such an attack allows the attacker node to spoof the identity of sink and act like sink itself. The sensor nodes focus on the transmission of information to the attacker node instead of BS. This research study suggests an algorithm to explore and segregate the attacker nodes from the network. This algorithm is designed on the basis of the identify confirmation. The NS2 (Network Simulator 2) is utilized to deploy the suggested algorithm and diverse metrics are utilized for analyzing the results.

2016 ◽  
Vol 25 (07) ◽  
pp. 1650067 ◽  
Author(s):  
Álvaro Díaz ◽  
Javier González-Bayon ◽  
Pablo Sánchez

Sensor nodes are low-power and low-cost devices with the requirement of a long autonomous lifetime. Therefore, the nodes have to use the available power carefully and avoid expensive computations or radio transmissions. In addition, as some wireless sensor networks (WSNs) process sensitive data, selecting a security protocol is vital. Cryptographic methods used in WSNs should fulfill the constraints of sensor nodes and should be evaluated for their security and power consumption. WSN engineers use several metrics to obtain estimations prior to network deployment. These metrics are usually related to power and execution time estimation. However, security is a feature that cannot be estimated and it is either “active” or “inactive”, with no possibility of introducing intermediate security levels. This lack of flexibility is a disadvantage in real deployments where different operation modes with different security and power specifications are often needed. This paper proposes including a new security estimation metric in a previously proposed framework for WSN simulation and embedded software (SW) performance analysis. This metric is called Security Estimation Metric (SEM) and it provides information about the security encryption used in WSN transmissions. Results show that the metric improves flexibility, granularity and execution time compared to other cryptographic tests.


A distributed sort of network in which sensor nodes can join or leave the network when they want is identified as wireless sensor network. Due to self-arranging of the network, attacker nodes make their entry inside networks and launch different types of active and passive intrusions. The active attacks can be divided into various sub categories and one of them is misdirection attack. This attack increases delay in the network. The available attacker hub will trigger attack. In order to recognize and disengage malicious nodes a novel strategy is proposed in this work. The malicious nodes are recognized from the networks which are in charge of triggering the node. The attacker or malevolent node launches sinkhole intrusion. This intrusion streams fake recognition information within the network. This study proposes a verification approach for detecting attacker nodes present in the network. The performance of introduced approach is tested in NS2. It is scrutinized that performance is improved as per various parameters.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Danyang Qin ◽  
Shuang Jia ◽  
Songxiang Yang ◽  
Erfu Wang ◽  
Qun Ding

Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS) is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.


2020 ◽  
pp. 1215-1232
Author(s):  
George William Kibirige ◽  
Camilius A. Sanga

Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.


Author(s):  
George William Kibirige ◽  
Camilius A. Sanga

Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.


Security issue in Wireless Sensor Networks (WSNs) is a major problem while dealing with WSNs. Therefore, WSNs are susceptible to various kinds of safety assaults. The restricted capability of sensor nodes is one reason for attacks in sensor networks. In WSNs, on the network layer, there are different kinds of safety attack detection methods. There are also many severe limitations in sensor nodes such as energy efficiency, reliability, scalability that affect WSN safety. As sensor nodes have restricted ability for the majority of the limitations, a selective forwarding attack in the networks is hard to identify. In selective forwarding attack, malicious nodes function as a ordinary nodes. However, it tries to find and crash messages prior to forwarding the packet to further nodes. For keeping this sort of attack aside from networks, we suggest a multi-layer strategy, Selective Forwarding Detection (SFD) that maintains the safe transmission of information among sensor nodes at the same time as detecting the selective forwarding attack. In addition, energy efficiency, reliability and scalability are part of the approach.


2019 ◽  
Vol 8 (3) ◽  
pp. 1197-1203

The internet of things is the self-configuring type of network in which sensor nodes join or leave the network. The version number is the active type of attack possible in DODAG protocol of IoT. The Shield technique is proposed in the previous research work for the mitigation of version number attack in the network. It is very much complex for the detection of malicious nodes. In this research work, the trust based mechanism is proposed for the isolation of version number attack. The trust based mechanism calculates trust of each sensor node. The sensor nodes with the least trust are identified from the network as malicious nodes. The proposed mechanism is implemented in network simulator version 2. The trust based mechanism and shied based techniques are implemented and results are analyzed in terms of throughput, delay, control message overhead and average power consumption. It is analyzed that in terms of all parameters trust mechanism performs well as compared to shield based technique


Chicken meat are being widely consumed as they contain high protein and a healthier unsaturated fat type. Chicken burger represent a consumer palatable chicken product. Both chicken and its products are liable to different types of contamination during their preparation and processing. Contamination by S. aureus and its enterotoxins poses a major public health hazard to chicken meat consumes. During this study 100 different samples of chicken fillet, deboned thigh, wing, mechanically deboned meat (MDM) and chicken burger (20 each) was collected from market and investigated for their S. aureus count and ability of the isolated strains to produce enterotoxins using conventional plating and isolation technique as well as using SET-RPLA toxin detection kit. Results revealed that mean values of S. aureus count in all samples exceeded the permissible limits and hence being unacceptable. MDM isolated exhibited staphylococcal enterotoxins (SEs) production of three different types SEA, SEC and SED. Meanwhile chicken burger S. aureus isolates produced only SEA and SEC enterotoxins. While isolated S. aureus from chicken fillet and deboned thigh didn’t exhibit any enterotoxin production activity. It’s recommended to follow the hygienic practices during different processing stages to avoid the risk of S. aureus and its enterotoxins.


2017 ◽  
Vol 11 (1) ◽  
pp. 14-24
Author(s):  
Е. М. Abbasov

The problems of integration of the various wireless technologies, for-consists in the provision of required transmission speed and the transmission of information over a considerable distance at low power sensor nodes transmitters wireless Internet-water network for remote monitoring. Analyzed the integration of wireless LAN standard IEEE 802.11n/g and Bluetooth. Determined Graphic analytical dependence-dence, the defining characteristics of the data rate for wireless IEEE 802.11n / g networks. It analyzes the main shortcomings of BSS associated with ef cient use of batteries; the basic Metody reduce energy consumption for WSN based on the ZigBee technology, based on the planning schemes of awakening and data collection schemes. The possibilities MeshLogic technology solutions for the monitoring and control tasks that are critical to BPE-autonomous work Meni sensors.


Sign in / Sign up

Export Citation Format

Share Document