Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 381))

Abstract

In this paper, we proposed an efficient rule-based intrusion detection system for identifying sinkhole attacks in Wireless Sensor Networks (WSN). The sensor nodes in network are deployed in various hostile environments. The nature of WSNs is wireless and hence, security is the major challenging issue. Sinkhole attack is the major common internal attack on WSNs. These attacks are performed by creating a malicious node with the highest transmission range to the base station. Then this node broadcast sends fake routing message to all its neighbor nodes. We considered popular link quality-based multi-hop routing protocol named as Mint-Route protocol. To identify sinkhole attack, we have implemented an IDS system which consists of suitable rules. These rules will allow the IDS to detect the malicious node successfully. We demonstrated this method in random dissemination of sensor nodes in WSNs. We experimented to confirm the accuracy of our anticipated method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tumrongwittayapak, C., Varakulsiripunth, R.: Detecting Sinkhole attacks in wireless sensor networks. ICROS-SICE International Joint Conference, pp. 1966–1971 ((2009))

    Google Scholar 

  2. Venkatraman, K., Vijay Daniel, J., Murugaboopathi, G.: Various attacks in wireless sensor network: survey. Int. J. Soft Comput. Eng. (IJSCE). 3(1), (2013). ISSN:2231-2307

    Google Scholar 

  3. Parwekar, P., Reddy, R.: An efficient fuzzy localization approach in wireless sensor network. Fuzzy Digital Object Identifier, pp. 1–6 (2013). 10.1109/FUZZ-IEEE.2013.6622548Publication

  4. Ioannis, K., Tassos, D., Thanassis, G., Marios, M.: Intrusion detection of sinkhole attacks in wireless sensor networks. Algorithmic Aspects Wireless Sensor Networks Lecture Notes Comput. Sci. 4837, 150–161 (2008)

    Google Scholar 

  5. Md. Ibrahim, A., Mohammad, M.R., Mukul, C.R.: Detecting sinkhole attacks in wireless sensor network using hop count. I. J. Comput. Network Inform. Secur. 3, 50–56 (2015)

    Google Scholar 

  6. Levis, P., Madden, S., Polastre, J., et al.: TinyOS: an operating system for sensor networks. Springer, Berlin Heidelberg (2005)

    Google Scholar 

  7. Pahlavan, K., Li, X.: Indoor geo-location science and technology. IEEE Commun. Mag. 40(2), 112–118 (2002)

    Article  Google Scholar 

  8. Umashri, K., Dr. Nalini, N.: Detecting sinkhole attack in wireless sensor networks. Int. J. Scient. Eng. Res. 5, 6, (2014)

    Google Scholar 

  9. Junaid, A.C., Usman, T., Mohammed, A.A., Rittenhouse, R.G.: Sinkhole vulnerabilities in wireless sensor networks. Int. J. Security Appl. 8(1), 401–410 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Imandi Raju .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Raju, I., Parwekar, P. (2016). Detection of Sinkhole Attack in Wireless Sensor Network. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 381. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2526-3_65

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2526-3_65

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2525-6

  • Online ISBN: 978-81-322-2526-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics