Open Access Open Access  Restricted Access Subscription Access

Boundry Based Detection and Prevantion of Sink Hole Attacks in MANET

Surabhi Tiwari, Deven Shah

Abstract


Wireless Sensor network is comprised of huge amount of small cost minimal power sensor nodes. The flexibility of wireless sensor networks makes them very attractive to attackers. Wireless sensor networks face resource constraints containing limits on the memory capacity, communication, power and computational power. Also, since they are frequently organized in unfriendly atmospheres and left unattended, they are vulnerable to numerous attacks. One of the major well known and severe attacks in wireless sensor networks is sinkhole attack Sinkhole attacks happen when an affected node attracts network traffic by the advertising fake routing updates. A sinkhole attack targets a sink node. In sinkhole attack a sensor node will consists of a set of false neighbors. Various detection and prevention techniques have been devised but it is still a challenging task. In our proposed work we are detecting as well preventing this severe attacks for that we select two nodes cluster head or boundary nodes. Boundary node behaves as a mediator node for cluster head or base station. Whenever one round completed cluster head and boundary node change.

Keywords: Wireless Sensor Network, Attack, AODV, Security

Cite this Article
Surabhi Tiwari, Dr. Deven Shah. Boundry based detection and prevantion of sink hole attacks in MANET. Journal of Multimedia Technology & Recent Advancements. 2015; 2(3): 26–35p.


Full Text:

PDF

References


Kiran Maraiya, Kamal Kant, Nitin Gupta. Application based study on wireless sensor network. International Journal of Computer Applications. 2011; 21(8): 9–15p.

Ahmad Salehi S, Razzaque MA, Parisa Naraei et al. Detection of sinkhole attack in wireless sensor networks. Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace); 2013 July 1–3.

Marianne A, Azer Sherif M, El-Kassas Abdel Wahab et al. Intrusion detection for wormhole attacks in ad hoc networks a survey and a proposed decentralized scheme. The Third International Conference on Availability, Reliability and Security; 2008.

Chen C, Song M, Hsieh G. Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. Proceedings of Wireless Communications, Networking and Information Security (WCNIS). IEEE; 2010. 711p.

Samundiswary PP, Dananjayan P. Detection of sinkhole attacks for mobile nodes in heterogeneous sensor networks with mobile sinks. International Journal of Computer and Electrical Engineering. 2010; 2: 127e33p.

Sharmila S, Umamaheswari G. Detection of sinkhole attack in wireless sensor networks using message digest algorithms. Proceedings of Process Automation, Control and Computing (PACC), IEEE; 2011. 1e6p.

Sheela NK, Mahadevan G. A non cryptographic method of sinkhole attack detection in wireless sensor networks. Proceedings of IEEE-International Conference On Recent Trends In Information Technology; 2011. 527e32p.

Maliheh Bahekmat, Mohammad Hossein Yaghmaee, Ashraf Sadat Heydari Yazd et al. A novel algorithm for detecting sinkhole attacks in WSNs. International Journal of Computer Theory and Engineering. 2012; 4(3): 418–421p.

Manisha, Gaurav Gupta. Attacks on wireless sensor networks: A survey. International Journal of Advanced Research in Computer Science and Software Engineering. 2013; 3(10): 190–197p.

Udaya Suriya Rajkumar, Rajamani Vayanaperumal. A leader based monitoring approach for sinkhole attack in wireless sensor network. International Journal of Computer Science. 2013; 9(9): 1106–1116p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/