A Survey on Various Detection Techniques of Sinkhole Attacks in WSN

被引:0
|
作者
Mathew, Annie [1 ]
Terence, J. Sebastian [1 ]
机构
[1] Karunya Univ, Dept Comp Sci & Technol, Coimbatore, Tamil Nadu, India
关键词
Wireless Sensor Network; Packet dropping; Sinkhole attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Network (WSN) is a network consists of many sensor nodes that are capable of sensing and communicating with in a shortest range. Security is one of the main issues in WSN due to its communication nature. The sensor nodes been prone to various attack such as sinkhole attack, wormhole attack, gray hole attack etc. Sinkhole attack is one of the attacks in WSN where the sinkhole node showcases itself having the shortest path to sink or destination node. Researchers proposed different methodologies to detect the sinkhole attack. In this paper, we have studied sinkhole attack and we have classified the sinkhole detection method by using various parameters. It also reviewed the threats and challenges in WSN through this attack.
引用
收藏
页码:1115 / 1119
页数:5
相关论文
共 50 条
  • [31] A Wormhole Attacks Detection using a QTS algorithm with MA in WSN
    Jao, Meng-Hsiu
    Hsieh, Ming-Hsuan
    He, Kuan-Hsien
    Liu, Dai-Hua
    Kuo, Shu-Yu
    Chu, Ting-Hui
    Chou, Yao-Hsin
    2015 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2015): BIG DATA ANALYTICS FOR HUMAN-CENTRIC SYSTEMS, 2015, : 20 - 25
  • [32] Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool
    Singh, Tejinderdeep
    Arora, Harpreet Kaur
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (02) : 32 - 35
  • [33] ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers
    Gite P.
    Chouhan K.
    Murali Krishna K.
    Kumar Nayak C.
    Soni M.
    Shrivastava A.
    Materials Today: Proceedings, 2023, 80 : 3769 - 3776
  • [34] A Survey on Various Cryptanalytic Attacks on the AES Algorithm
    Zodpe, Harshali
    Shaikh, Arbaz
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2021, 12 (02): : 115 - 123
  • [35] SURVEY OF VARIOUS CALCINING TECHNIQUES
    ALEXANDE.JM
    AMERICAN CERAMIC SOCIETY BULLETIN, 1966, 45 (08): : 750 - &
  • [36] Survey on Various Techniques of Tracking
    Mishra, Asmita
    Chandra, Mayank
    Jaiswal, Namrata
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENGINEERING AND APPLICATIONS (ICACEA), 2015, : 249 - 254
  • [37] Intrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks
    Moon, Soo Young
    Cho, Tae Ho
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 118 - 122
  • [38] A Survey of Reversible Watermarking Techniques, Application and Attacks
    Thilagavathi, N.
    Saravanan, D.
    Kumarakrishnan, S.
    Punniakodi, Sakthivel
    Amudhavel, J.
    Prabu, U.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [39] An overview of phishing attacks and their detection techniques
    Dadkhah, Mehdi
    Jazi, Mohammad Davarpanah
    Mobarakeh, Majid Saidi
    Shamshirband, Shahaboddin
    Wang, Xiaojun
    Raste, Sachin
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (04) : 187 - 195
  • [40] Survey on Various Matrix Based Key Management Scheme in WSN
    Abinaya, S.
    Kiruthika, B.
    Ezhilarasie, R.
    Umamakeswari, A.
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2015, 6 (03): : 1388 - 1396