WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS AND EFFECT OF BLACKHOLE AND SINKHOLE ATTACKS

Authors

  • Raja Waseem Anwar Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia.
  • Majid Bakhtiari Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia.
  • Anazida Zainal Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia.
  • Kashif Naseer Qureshi Faculty of Computing, Universiti Teknologi Malaysia, 81310 UTM Johor Bahru, Johor, Malaysia.

DOI:

https://doi.org/10.11113/jt.v78.8254

Keywords:

WSN, security, black hole, attacks

Abstract

The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic. Sinkhole and Blackhole attacks are very common attacks in network, where an attacker advertises un-authorized routing update in network. To deal with these types of attacks, there is a need to tighten the network security and prevent from attackers. In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. The simulation results illustrated that, how these attacks affect the network performance. 

References

Rong, C.-m., Eggen, S., and H.-b. Cheng. 2011 .A Novel Intrusion Detection Algorithm For Wireless Sensor Networks, in Wireless Communication. Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference. 28 Feb- 3 March 2011. 1-7.

Qureshi, K. N., and Abdullah, A. H. 2014 .Adaptation of Wireless Sensor Network in Industries and Their Architecture, Standards and Applications,. World Applied Sciences Journal. 30(10): 1218-1223.

Qureshi, K. N., and Abdullah, A. H. 2013 .A survey on intelligent transportation systems. Middle-East Journal of Scientific Research. 15: 629-642.

Qureshi, K. N., Abdullah, A. H., and Anwar, R. W. 2014. Wireless Sensor Based Hybrid Architecture for Vehicular Ad hoc Networks, TELKOMNIKA (Telecommunication Computing Electronics and Control). 12(4): 942-949.

Anwar, R. W., Bakhtiari, M., Zainal, A., and Qureshi, K. N. 2015 .A Survey of Wireless Sensor Network Security and Routing Techniques. Research Journal of Applied Sciences, Engineering and Technology. 9(11): 1016-1026.

Chan, H., Perrig, A., and Song, D. 2003. Random Key Predistribution Schemes For Sensor Networks. Security and Privacy. Proceedings. 2003 Symposium. 97-213.

Hwang, J., and Kim, Y. 2004. Revisiting Random Key Pre-Distribution Schemes For Wireless Sensor Networks. Proceedings of the 2nd ACM workshop on Security Of Ad Hoc And Sensor Networks. 43-52.

Carman, D. W., Kruus, P. S. and Matt, B. J. 2000. Constraints And Approaches For Distributed Sensor Network Security (final). DARPA Project report,(Cryptographic Technologies Group, Trusted Information System, NAI Labs). 1(1).

Perrig, A., Szewczyk, R., Tygar, J., Wen, V., and Culler, D. E. 2002. SPINS: Security Protocols For Sensor Networks. Wireless networks. 8(5): 521-534.

Eschenauer, L. and Gligor, V. D. 2002. A Key-Management Scheme For Distributed Sensor Networks. Proceedings of the 9th ACM conference on Computer and Communications Security. 41-47.

Samundiswary, P., Sathian, D., and Dananjayan, P. 2010. Secured Greedy Perimeter Stateless Routing For Wireless Sensor Networks. International Journal of Ad hoc, Sensor & Ubiquitous Computing ( IJASUC ). 1(2): 9-20.

Sen, J. 2009. A Survey on Wireless Sensor Network Security. International Journal of Communication Networks and Information Security (IJCNIS). 1(2): 55-78

Onat, I. and Miri, A. 2005. An Intrusion Detection System For Wireless Sensor Networks. Wireless And Mobile Computing, Networking And Communications, 2005.(WiMob'2005), IEEE International Conference on. 253-259.

Tumrongwittayapak, C., and Varakulsiripunth, R. 2009. Detecting Sinkhole Attacks In Wireless Sensor Networks. ICCAS-SICE. Fukuoka, Japan. 18-21 August 2009 1966-1971.

Tumrongwittayapak, C., and Varakulsiripunth, R. 2009. Detecting Sinkhole Attack And Selective Forwarding Attack In Wireless Sensor Networks, in Information, Communications and Signal Processing, 2009. ICICS 2009. 7th International Conference. 1-5.

Coppolino, L., D'Antonio, S., Romano, L., and Spagnuolo, G. 2010. An Intrusion Detection System For Critical Information Infrastructures Using Wireless Sensor Network Technologies. Critical Infrastructure (CRIS), 2010 5th International Conference. 1-8.

Shafiei, H., Khonsari, A., Derakhshi, H., and Mousavi, P. 2014. Detection And Mitigation Of Sinkhole Attacks In Wireless Sensor Networks. Journal of Computer and System Sciences. 80(33): 644-653.

Hamedheidari, S., and Rafeh, R. 2013. A Novel Agent-Based Approach To Detect Sinkhole Attacks In Wireless Sensor Networks. Computers & Security. 37:1-14.

Le Fessant, F., Papadimitriou, A., Viana, A. C., Sengul, C., and Palomar, E. 2012. A Sinkhole Resilient Protocol For Wireless Sensor Networks: Performance And Security Analysis. Computer Communications. 35(2): 234-248.

Sheela, D., Naveen, K., and Mahadevan, G. 2011. A Non-Cryptographic Method Of Sink Hole Attack Detection In Wireless Sensor Networks. Recent Trends in Information Technology (ICRTIT), 2011 International Conference. Chennai, Tamil Nadu. 3-5 June 2011. 527-532.

Sharmila, S., and Umamaheswari, G. 2011. Detection Of Sinkhole Attack In Wireless Sensor Networks Using Message Digest Algorithms,. in Process Automation, Control and Computing (PACC), 2011 International Conference. Coimbatore, Tamil Nadu. 20-22 July 2011. 1-6.

I. Krontiris, T. Giannetsos, and T. Dimitriou. 2008 .Launching A Sinkhole Attack In Wireless Sensor Networks; The Intruder Side,. in Networking and Communications, 2008. WIMOB'08. IEEE International Conference on Wireless and Mobile Computing. 526-531.

I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, 2008 .Intrusion Detection Of Sinkhole Attacks In Wireless Sensor Networks,. in Algorithmic Aspects of Wireless Sensor Networks, ed: Springer. 150-161.

V. C. Giruka, M. Singhal, J. Royalty, and S. Varanasi, 2008 .Security In Wireless Sensor Networks,. Wireless Communications And Mobile Computing. 8: 1-24.

M. Guechari, L. Mokdad, and S. Tan. 2012 .Dynamic Solution For Detecting Denial Of Service Attacks In Wireless Sensor Networks,. in Communications (ICC), 2012 IEEE International Conference on. 173-177.

S. Misra, K. Bhattarai, and G. Xue. 2011 .BAMBi: Blackhole Attacks Mitigation With Multiple Base Stations In Wireless Sensor Networks,. in Communications (ICC), 2011 IEEE International Conference on. 1-5.

A. R. Mahmood, H. H. Aly, and M. N. El-Derini. 2011 .Defending Against Energy Efficient Link Layer Jamming Denial Of Service Attack In Wireless Sensor Networks,. in Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on. 38-45.

R. Nanda and P. Venkata Krishna. 2011.A Self Enforcing And Flexible Security Protocol For Preventing Denial Of Service Attacks In Wireless Sensor Networks,. in Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE. 847-850.

A. Prathapani, L. Santhanam, and D. P. Agrawal, 2009 .Intelligent Honeypot Agent For Blackhole Attack Detection In Wireless Mesh Networks,. in Mobile Adhoc and Sensor Systems, 2009. MASS'09. IEEE 6th International Conference on. 753-758.

Downloads

Published

2016-04-18

How to Cite

WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS AND EFFECT OF BLACKHOLE AND SINKHOLE ATTACKS. (2016). Jurnal Teknologi, 78(4-3). https://doi.org/10.11113/jt.v78.8254