A Novel Approach for Isolation of Sinkhole Attack in Wireless Sensor Networks
- Resource Type
- Conference
- Authors
- Kala, Prakash C; Agrawal, Arun Prakash; Sharma, Rishi Rajan
- Source
- 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence) Cloud Computing, Data Science & Engineering (Confluence), 2020 10th International Conference on. :163-166 Jan, 2020
- Subject
- Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
General Topics for Engineers
Robotics and Control Systems
Signal Processing and Analysis
Wireless sensor networks
Cloud computing
Data science
Wireless communication
Conferences
Computer security
Routing
Wireless Sensor Networks
Sink Hole Attack
Spoofing
Malicious nodes
NS2
- Language
Maintaining security and energy consumption of wireless sensor networks is a bit difficult due to non-availability of any central controller. They are also self-configuring in nature. Such types of networks are susceptible to several types of attacks. In this paper, we focus on one such attack called sink hole attack in which the malicious nodes spoof identification of base station and act like base station. The sensor nodes start transmitting data to malicious node instead of base station. This paper proposes a new technique to identify and eliminate such malicious nodes using identity verification to provide a secure environment for communication in the network. Proposed technique is implemented in NS2 and extensive simulations are performed to obtain the results. Results indicate the superiority of the proposed approach over existing approaches in terms of (packet loss, energy consumption, delay and throughput).