Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 140 , Downloads: 117 | CTR: 84 % | Weekly Popularity: ⮙4

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Wireless Sensor Networks (WSNs) are a promising approach that are useful for variety of applications; such as monitoring safety and security of buildings and spaces; military applications; measuring traffic flows; tracking environmental pollutants; etc. Security for WSNs is a very serious and challenging task these days as they have very important personal or national security level informations in them; mainly following are the challenges faced while designing for a robust secure WSNs; the devices in the sensor networks have severe constraints such as minimal energy; minimal computational and communicational capabilities. And secondly; there is an additional risk of physical attacks such as node capture and tampering; eavesdropping etc. Hence we need a technique which can detect the intrusion of any malicious node in the networks; which can create an alarm for taking appropriate steps to secure the information in the WSN. these techniques should be lightweight because of resource-constrained nature of WSNs[1]. As we are aware of the different kinds of attacks for WSNs. In this paper we propose the lightweight robust technique called Received Signal Strength Indicator (RSSI) for detecting Sinkhole attacks in the WSNs. We have built our own protocol and the RSSI techniques are applied to detect the sinkhole attack. The RSSI technique doesnt cause communication overhead because it will not load the ordinary nodes since the presence of EM nodes. Also we propose a lightweight scheme called Traffic Monitor Based Selective Forwarding Attack Detection Scheme. Our approach uses EM nodes to eavesdrop and monitor all traffics of the network. RSSI technique was earlier implemented using visual sense; In this paper we have implemented RSSI technique in NS2 simulator. The simulation results show the efficient detection of the Sinkhole attacks in WSNs.

Keywords: WSN, RSSI, detecting sinkhole attacks and selective forwarding attack, intruder detection

Edition: Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Share this Article

How to Cite this Article?

Umashri Karkikatti, Dr. Nalini N, "Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014431, Volume 3 Issue 6, June 2014, 1045 - 1051

140 PDF Views | 117 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'WSN'

Views: 230 , Downloads: 152 | CTR: 66 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Views: 75 , Downloads: 59 | CTR: 79 % | Weekly Popularity: ⮙7

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 262 - 265

Data Gathering Optimization Using ACO and Genetic Algorithm in WSN

Shabir Ur Rashid, Mrigana Walia

Share this Article

Views: 101 , Downloads: 69 | CTR: 68 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 125 , Downloads: 98 | CTR: 78 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1147 - 1150

Enhance QoS of Lossy Wireless Sensor Network by In-Network Data Aggregation

Harshada Kupade, Madhav Ingle

Share this Article

Similar Articles with Keyword 'RSSI'

Views: 136 , Downloads: 106 | CTR: 78 % | Weekly Popularity: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2319 - 2322

Indoor Tracking Using Wi-Fi Routers on a Smartphone

Rutujit K. Diwate, D. N. Rewadkar

Share this Article

Views: 147 , Downloads: 109 | CTR: 74 % | Weekly Popularity: ⮙5

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1394 - 1396

Human Intrusion Detection Using Wi-Fi or ZigBee RF Signals

Ronak Gune

Share this Article

Views: 140 , Downloads: 117 | CTR: 84 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1045 - 1051

Detecting Sinkhole and Selective Forwarding Attack in Wireless Sensor Networks

Umashri Karkikatti, Dr. Nalini N

Share this Article

Views: 136 , Downloads: 118 | CTR: 87 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2434 - 2437

An Efficient Packet Loss Avoidance Mechanism in MANETs

Biradar Prashant D, Satish Kumar N

Share this Article

Views: 147 , Downloads: 129 | CTR: 88 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 270 - 273

SVM: The Qualitative and Quantitative Monolithic Predictor

Abhijit Adhikari, Chetan Nimba Aher

Share this Article
Top