SlideShare a Scribd company logo
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 3 Issue 6ǁ June 2014 ǁ PP.12-14
www.ijesi.org 12 | Page
Detection Techniques of Sinkhole Attack in WSNs: A Survey
Rajakumaran L1
Thamarai Selvi R2
1
M.Phil. Scholar 2
Asst. Professor, Department of Computer Applications,
Bishop Heber College (Autonomous), Trichirappalli-620 017
1
rajkumaranmca@gmail.com 2
thams_shakthi@yahoo.co.in
ABSTRACT: Wireless Sensor Networks (WSNs) are widely used in many areas of non-commercial like
military, health care, environmental monitoring, and commercial products like house holding, vehicles etc. WSN
are placed in the harsh environment and due to the wireless nature of communication they are vulnerable to
various security attacks like Sinkhole attack, Black hole attack, Sybil attack and Wormhole attack, Jamming
attack etc,. The sinkhole attack is one of the most destructive routing attacks in WSN. This paper discus about
various detection techniques for the sinkhole attacks in WSN.
KEYWORDS: wireless sensor network, sinkhole attack, Intrusion detection.
I. INTRODUCTION
Wireless sensor network (WSN) is a collection of sensor nodes which are capable of sensing and
processing data and send them to a base station as shown in the figure 1. These sensor nodes are small in size.
They are deployed in an unattended environment which is not physically protected. They are used for
monitoring of that environment and send back the collected data to the Base Station (BS). WSN are light
weighted and have limited power sources, limited memory storage, limited computational capability and
transmission range. They are vulnerable to various security threats as they use the wireless medium for
transmission of the data to the BS. There are several attacks in each layer of the sensor networks. The physical
layer attacks are jamming, tampering, Data link layer attacks are Jamming and collision; Network layer attacks
are selective forwarding attack, sinkhole attack, Sybil attack, black hole attack, wormhole attack; Transport
layer attacks are flooding attack, de-synchronization attack. One of the most dangerous and very difficult to
detect the attack is sinkhole attack because using this attack we can perform any type of attack in the WSN.
Figure 1 wireless sensor network
Sinkhole attack
The sinkhole attack in WSN is that an intruder uses a compromised node in the sensor network of a
particular area and lures some or all the traffic of that particular area and makes a sinkhole. Sinkhole attacks are
Detection Techniques Of Sinkhole…
www.ijesi.org 13 | Page
carried out by making the compromised node look more attractive to all the neighboring nodes which have an
effective routing path to the destination with high rate of energy.
For example that node may be any laptop with high energy and high performance power. First it just advertise
that it have a high quality single hop connection with the BS to its neighboring nodes. After that all the nodes
divert all their traffic to pass through the intruder node to the BS. Thus sinkhole attack is launched. Sinkholes
attacks are difficult to be detected because of the routing information provided by each node are difficult to
verify. Once the attacker made the sinkhole attack he can perform any type of attack in the WSN as the entire
traffic flows through that sinkhole node so he can collect all the data through the node and misuse the collected
data. He even drop all the packets or some of the packets also can perform Selective Forwarding attack,
Wormhole attack, Flooding attack, Sybil attack, Black hole attack.
II. RELATED WORK
Udaya Suriya Rajkumar. D., et al., [1 proposed a LBIDS (Leader Based Intrusion Detection System) solution
to detect and defend against the sinkhole attack in WSN. The proposed solution consists of three algorithms a
Leader Election Algorithm, Algorithm for Avoid Malicious, CheckIDS Algorithm. In this approach a region
wise leader is elected for each group nodes within the network. That leader performs the intrusion detection
mechanism by comparing and manipulating the behavior of each node within the cluster and monitors each node
behavior for any sinkhole attack to occur. When a compromised node gets detected the leader informs other
leader within the WSN, about the sinkhole node so all the leaders in the network stops communication with that
particular sinkhole Node. The energy efficiency and intrusion detection rate is high.
D. Sheela., et al., [2] proposed routing algorithm based on mobile agents to defend against sinkhole attacks in
WSN. Mobile agent is a self controlling software program that visits every node in the network either periodical
or on required. By using the collected information the mobile agents make every node alert of the entire network
so that a valid node would not listen to the wrong information from malicious or compromised node which leads
to sinkhole attack. The important feature of the proposed mechanism is that does not require any encryption or
decryption mechanism for detecting the sinkhole attack. Very less energy is enough for this mechanism than the
normal routing protocols.
Maliheh Bahekmat., et al., [3] discussed about a novel algorithm for detecting sinkhole attacks in WSNs in
terms of energy consumption. The proposed algorithm works by comparing the control fields of the received
data packets with the original control packet, whenever a node needs to send data to the BS, it first sends a
control packet directly to the main BS. Then it begins to send data packets in form of hop by hop routing to the
BS. After the data packet arrives at the BS, it compares the control fields of the received data packets with the
original control packet. If any manipulations have been detected to these control fields or loss in the data packet,
the BS detects that there is a malicious node in that path by using the proposed strategy. Advantage of this
method is very less energy consumed for the detection mechanism. This algorithm can also be used for detection
of wormhole attacks. The performance of the proposed algorithm is examined in MAT lab stimulation.
Tejinderdeep Singh and Harpreet Kaur Arora [4] proposed a solution for Sinkhole attacks detection in
WSN using Ad-hoc On-Demand Distance Vector (AODV) Routing Protocol. This system consists of three
steps. The sender node first requests the sequence number with the rreq message, if the node replies its sequence
number with rrep message. Transmitting node will match sequence number in its routing table. If matches then
data will be shared otherwise it will be assign the sequence number to the node. If the node accepts the sequence
number then the node will enter in the network otherwise it will be eradicated from the network.
S.Sharmila and Dr G Umamaheswari [5] proposed a solution for Detection of sinkhole attack in wireless
sensor networks using message digest algorithms. Detecting the exact sink hole by using the one-way hash
chains is the main aim of this protocol. In the proposed method destination detects the attack only when the
digest obtained from the trustable forward path and the digest obtained through the trustable node to the
destination are different. It also ensures the data integrity of the messages transferred using the trustable path.
The algorithm is also robust to deal with cooperative malicious nodes that attempt to hide the real intruder. The
functionality of the proposed algorithm is tested in MAT lab stimulation.
Ahmad Salehi S., et al., [6] proposed a light weight Algorithm to detect the sinkhole attack node in the WSN
the algorithm consist of two step process. The first step is to find a list of affected nodes in that area by checking
the data consistency and the second step to then effectively identifies the intruder in the list by analyzing the
Detection Techniques Of Sinkhole…
www.ijesi.org 14 | Page
network flow information. The algorithm is also robust to deal with multiple malicious nodes that cooperatively
hide the real intruder. The proposed algorithm’s performance has been evaluated by using numerical analysis
and simulations.
Murad A. Rassam., et al., [7] proposed fuzzy rules based detection mechanism of sinkhole in Mintroute
WSNs. This detection system is first distributed in each and every node to keep monitoring the entire network
which assures a high detection possibility; second the deciding of finding the attacker is done by the sink by the
cooperation mechanism after receiving id of the suspected sinkhole from each node; which causes cutback of
communication with all sensor nodes by broadcasting the suspected nodes ID. In this system the sink is involved
in making the decision about the attack based on the alarms received from the nodes. This scheme has the ability
of detecting sinkhole attack in small scale WSNs.
III. SUMMARY
This paper surveyed the various detection and prevention mechanisms of sinkhole attacks in the
wireless sensor networks. The detection of sinkhole attacks are very difficult problem. Still there are many other
approaches and challenges in detection of sinkhole attack in WSN.
REFERENCES
[1] Udaya Suriya Rajkumar, D and Rajamani Vayanaperumal, “A Leader Based Monitoring Approach for Sinkhole Attack in Wireless
Sensor Network”, Journal of Computer Science 9 (9): 1106-1116, 2013, pp 1106-1116. ISSN: 1549-3636
[2] D. Sheela, et al, “A non Cryptographic method of Sink hole attack Detection in Wireless Sensor Networks”, IEEE-International
Conference on Recent Trends in Information Technology, June 3-5 2011, pp 527-532,
[3] Maliheh Bahekmat, et al, “A novel algorithm for detecting Sinhole attacks in WSNs”, International Journal of Computer Theory and
Engineering, Vol. 4, No. 3, June 2012, pp 418-421.
[4] Tejinderdeep Singh and Harpreet Kaur Arora, “Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2
Tool”, International Journal of Advanced Computer Science and Applications, Vol. 4, No. 2, 2013, pp 32-35.
[5] S.Sharmila and Dr G Umamaheswari; “Detection of sinkhole Attack in Wireless Sensor Networks using Message Digest Algorithms”
International Conference on Process Automation, Control and Computing (PACC) 2011, pp. 1-6
[6] Ahmad Salehi S., et al., Detection of Sinkhole Attack in Wireless Sensor Networks “Proceeding of the 2013 IEEE International
Conference on Space Science and Communication (IconSpace)”, 1-3 July 2013, pp 361-365.
[7] Murad A. Rassam., et al., A Sinkhole Attack Detection Scheme in Mintroute Wireless Sensor Networks “1st IEEE International
Symposium on Telecommunication Technologies” 26-28 Nov 2012, pp 71-75.

More Related Content

PDF
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
PDF
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
PDF
Detection and prevention of wormhole attack in mobile adhoc networks
ambitlick
 
PDF
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
 
PDF
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
dbpublications
 
PDF
Wormhole Attack
Pecific University
 
PDF
Tqds time stamped quantum digital signature to defend
eSAT Publishing House
 
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
Detection and prevention of wormhole attack in mobile adhoc networks
ambitlick
 
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
 
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
dbpublications
 
Wormhole Attack
Pecific University
 
Tqds time stamped quantum digital signature to defend
eSAT Publishing House
 

What's hot (20)

PDF
Enhanced green firewall for
ijistjournal
 
PPTX
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
PDF
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 
PPTX
Wormhole attack
Harsh Kishore Mishra
 
PDF
A Study on Security in Wireless Sensor Networks
ijtsrd
 
PPTX
A survey on complex wormhole attack in wireless
farrukh Farrukh
 
PDF
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
IJNSA Journal
 
PDF
wormhole attacks in wireless networks
Thesis Scientist Private Limited
 
PDF
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
IJERA Editor
 
PDF
Ar34261268
IJERA Editor
 
PDF
International Journal of Engineering Research and Development
IJERD Editor
 
PDF
Robust encryption algorithm based sht in wireless sensor networks
ijdpsjournal
 
PDF
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
IJNSA Journal
 
PDF
security in wireless sensor networks
researcherchennai
 
PDF
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
 
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
PDF
Protocols for detection of node replication attack on wireless sensor network
IOSR Journals
 
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
IOSR Journals
 
PDF
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
ijsptm
 
PDF
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
IOSR Journals
 
Enhanced green firewall for
ijistjournal
 
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 
Wormhole attack
Harsh Kishore Mishra
 
A Study on Security in Wireless Sensor Networks
ijtsrd
 
A survey on complex wormhole attack in wireless
farrukh Farrukh
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
IJNSA Journal
 
wormhole attacks in wireless networks
Thesis Scientist Private Limited
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
IJERA Editor
 
Ar34261268
IJERA Editor
 
International Journal of Engineering Research and Development
IJERD Editor
 
Robust encryption algorithm based sht in wireless sensor networks
ijdpsjournal
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
IJNSA Journal
 
security in wireless sensor networks
researcherchennai
 
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
ijsptm
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
Protocols for detection of node replication attack on wireless sensor network
IOSR Journals
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
IOSR Journals
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
ijsptm
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
IOSR Journals
 
Ad

Similar to C0363012014 (20)

PDF
Lz3421532161
IJERA Editor
 
PDF
Lz3421532161
IJERA Editor
 
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
PDF
I1802046780
IOSR Journals
 
PDF
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
PDF
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTR...
ijistjournal
 
PDF
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTR...
ijistjournal
 
PDF
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
IJNSA Journal
 
PDF
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 
PDF
K1803036872
IOSR Journals
 
PDF
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
PDF
Secure dynamic source routing protocol for defending black hole attacks in mo...
nooriasukmaningtyas
 
PDF
Hg3312711275
IJERA Editor
 
PDF
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
PDF
Q01813104114
IOSR Journals
 
PDF
Survey of wormhole attack in wireless sensor networks
CSITiaesprime
 
PDF
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
PDF
Data mining approach to analyzing intrusion detection of wireless sensor network
nooriasukmaningtyas
 
PDF
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
IAEME Publication
 
Lz3421532161
IJERA Editor
 
Lz3421532161
IJERA Editor
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
I1802046780
IOSR Journals
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTR...
ijistjournal
 
ENHANCED GREEN FIREWALL FOR EFFICIENT DETECTION AND PREVENTION OF MOBILE INTR...
ijistjournal
 
SECURED AODV TO PROTECT WSN AGAINST MALICIOUS INTRUSION
IJNSA Journal
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 
K1803036872
IOSR Journals
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
nooriasukmaningtyas
 
Hg3312711275
IJERA Editor
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
Q01813104114
IOSR Journals
 
Survey of wormhole attack in wireless sensor networks
CSITiaesprime
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
Data mining approach to analyzing intrusion detection of wireless sensor network
nooriasukmaningtyas
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
IAEME Publication
 
Ad

Recently uploaded (20)

PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PPTX
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PDF
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
IoT_Smart_Agriculture_Presentations.pptx
poojakumari696707
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
Biodegradable Plastics: Innovations and Market Potential (www.kiu.ac.ug)
publication11
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Zero Carbon Building Performance standard
BassemOsman1
 
Online Cab Booking and Management System.pptx
diptipaneri80
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 

C0363012014

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 3 Issue 6ǁ June 2014 ǁ PP.12-14 www.ijesi.org 12 | Page Detection Techniques of Sinkhole Attack in WSNs: A Survey Rajakumaran L1 Thamarai Selvi R2 1 M.Phil. Scholar 2 Asst. Professor, Department of Computer Applications, Bishop Heber College (Autonomous), Trichirappalli-620 017 1 [email protected] 2 [email protected] ABSTRACT: Wireless Sensor Networks (WSNs) are widely used in many areas of non-commercial like military, health care, environmental monitoring, and commercial products like house holding, vehicles etc. WSN are placed in the harsh environment and due to the wireless nature of communication they are vulnerable to various security attacks like Sinkhole attack, Black hole attack, Sybil attack and Wormhole attack, Jamming attack etc,. The sinkhole attack is one of the most destructive routing attacks in WSN. This paper discus about various detection techniques for the sinkhole attacks in WSN. KEYWORDS: wireless sensor network, sinkhole attack, Intrusion detection. I. INTRODUCTION Wireless sensor network (WSN) is a collection of sensor nodes which are capable of sensing and processing data and send them to a base station as shown in the figure 1. These sensor nodes are small in size. They are deployed in an unattended environment which is not physically protected. They are used for monitoring of that environment and send back the collected data to the Base Station (BS). WSN are light weighted and have limited power sources, limited memory storage, limited computational capability and transmission range. They are vulnerable to various security threats as they use the wireless medium for transmission of the data to the BS. There are several attacks in each layer of the sensor networks. The physical layer attacks are jamming, tampering, Data link layer attacks are Jamming and collision; Network layer attacks are selective forwarding attack, sinkhole attack, Sybil attack, black hole attack, wormhole attack; Transport layer attacks are flooding attack, de-synchronization attack. One of the most dangerous and very difficult to detect the attack is sinkhole attack because using this attack we can perform any type of attack in the WSN. Figure 1 wireless sensor network Sinkhole attack The sinkhole attack in WSN is that an intruder uses a compromised node in the sensor network of a particular area and lures some or all the traffic of that particular area and makes a sinkhole. Sinkhole attacks are
  • 2. Detection Techniques Of Sinkhole… www.ijesi.org 13 | Page carried out by making the compromised node look more attractive to all the neighboring nodes which have an effective routing path to the destination with high rate of energy. For example that node may be any laptop with high energy and high performance power. First it just advertise that it have a high quality single hop connection with the BS to its neighboring nodes. After that all the nodes divert all their traffic to pass through the intruder node to the BS. Thus sinkhole attack is launched. Sinkholes attacks are difficult to be detected because of the routing information provided by each node are difficult to verify. Once the attacker made the sinkhole attack he can perform any type of attack in the WSN as the entire traffic flows through that sinkhole node so he can collect all the data through the node and misuse the collected data. He even drop all the packets or some of the packets also can perform Selective Forwarding attack, Wormhole attack, Flooding attack, Sybil attack, Black hole attack. II. RELATED WORK Udaya Suriya Rajkumar. D., et al., [1 proposed a LBIDS (Leader Based Intrusion Detection System) solution to detect and defend against the sinkhole attack in WSN. The proposed solution consists of three algorithms a Leader Election Algorithm, Algorithm for Avoid Malicious, CheckIDS Algorithm. In this approach a region wise leader is elected for each group nodes within the network. That leader performs the intrusion detection mechanism by comparing and manipulating the behavior of each node within the cluster and monitors each node behavior for any sinkhole attack to occur. When a compromised node gets detected the leader informs other leader within the WSN, about the sinkhole node so all the leaders in the network stops communication with that particular sinkhole Node. The energy efficiency and intrusion detection rate is high. D. Sheela., et al., [2] proposed routing algorithm based on mobile agents to defend against sinkhole attacks in WSN. Mobile agent is a self controlling software program that visits every node in the network either periodical or on required. By using the collected information the mobile agents make every node alert of the entire network so that a valid node would not listen to the wrong information from malicious or compromised node which leads to sinkhole attack. The important feature of the proposed mechanism is that does not require any encryption or decryption mechanism for detecting the sinkhole attack. Very less energy is enough for this mechanism than the normal routing protocols. Maliheh Bahekmat., et al., [3] discussed about a novel algorithm for detecting sinkhole attacks in WSNs in terms of energy consumption. The proposed algorithm works by comparing the control fields of the received data packets with the original control packet, whenever a node needs to send data to the BS, it first sends a control packet directly to the main BS. Then it begins to send data packets in form of hop by hop routing to the BS. After the data packet arrives at the BS, it compares the control fields of the received data packets with the original control packet. If any manipulations have been detected to these control fields or loss in the data packet, the BS detects that there is a malicious node in that path by using the proposed strategy. Advantage of this method is very less energy consumed for the detection mechanism. This algorithm can also be used for detection of wormhole attacks. The performance of the proposed algorithm is examined in MAT lab stimulation. Tejinderdeep Singh and Harpreet Kaur Arora [4] proposed a solution for Sinkhole attacks detection in WSN using Ad-hoc On-Demand Distance Vector (AODV) Routing Protocol. This system consists of three steps. The sender node first requests the sequence number with the rreq message, if the node replies its sequence number with rrep message. Transmitting node will match sequence number in its routing table. If matches then data will be shared otherwise it will be assign the sequence number to the node. If the node accepts the sequence number then the node will enter in the network otherwise it will be eradicated from the network. S.Sharmila and Dr G Umamaheswari [5] proposed a solution for Detection of sinkhole attack in wireless sensor networks using message digest algorithms. Detecting the exact sink hole by using the one-way hash chains is the main aim of this protocol. In the proposed method destination detects the attack only when the digest obtained from the trustable forward path and the digest obtained through the trustable node to the destination are different. It also ensures the data integrity of the messages transferred using the trustable path. The algorithm is also robust to deal with cooperative malicious nodes that attempt to hide the real intruder. The functionality of the proposed algorithm is tested in MAT lab stimulation. Ahmad Salehi S., et al., [6] proposed a light weight Algorithm to detect the sinkhole attack node in the WSN the algorithm consist of two step process. The first step is to find a list of affected nodes in that area by checking the data consistency and the second step to then effectively identifies the intruder in the list by analyzing the
  • 3. Detection Techniques Of Sinkhole… www.ijesi.org 14 | Page network flow information. The algorithm is also robust to deal with multiple malicious nodes that cooperatively hide the real intruder. The proposed algorithm’s performance has been evaluated by using numerical analysis and simulations. Murad A. Rassam., et al., [7] proposed fuzzy rules based detection mechanism of sinkhole in Mintroute WSNs. This detection system is first distributed in each and every node to keep monitoring the entire network which assures a high detection possibility; second the deciding of finding the attacker is done by the sink by the cooperation mechanism after receiving id of the suspected sinkhole from each node; which causes cutback of communication with all sensor nodes by broadcasting the suspected nodes ID. In this system the sink is involved in making the decision about the attack based on the alarms received from the nodes. This scheme has the ability of detecting sinkhole attack in small scale WSNs. III. SUMMARY This paper surveyed the various detection and prevention mechanisms of sinkhole attacks in the wireless sensor networks. The detection of sinkhole attacks are very difficult problem. Still there are many other approaches and challenges in detection of sinkhole attack in WSN. REFERENCES [1] Udaya Suriya Rajkumar, D and Rajamani Vayanaperumal, “A Leader Based Monitoring Approach for Sinkhole Attack in Wireless Sensor Network”, Journal of Computer Science 9 (9): 1106-1116, 2013, pp 1106-1116. ISSN: 1549-3636 [2] D. Sheela, et al, “A non Cryptographic method of Sink hole attack Detection in Wireless Sensor Networks”, IEEE-International Conference on Recent Trends in Information Technology, June 3-5 2011, pp 527-532, [3] Maliheh Bahekmat, et al, “A novel algorithm for detecting Sinhole attacks in WSNs”, International Journal of Computer Theory and Engineering, Vol. 4, No. 3, June 2012, pp 418-421. [4] Tejinderdeep Singh and Harpreet Kaur Arora, “Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool”, International Journal of Advanced Computer Science and Applications, Vol. 4, No. 2, 2013, pp 32-35. [5] S.Sharmila and Dr G Umamaheswari; “Detection of sinkhole Attack in Wireless Sensor Networks using Message Digest Algorithms” International Conference on Process Automation, Control and Computing (PACC) 2011, pp. 1-6 [6] Ahmad Salehi S., et al., Detection of Sinkhole Attack in Wireless Sensor Networks “Proceeding of the 2013 IEEE International Conference on Space Science and Communication (IconSpace)”, 1-3 July 2013, pp 361-365. [7] Murad A. Rassam., et al., A Sinkhole Attack Detection Scheme in Mintroute Wireless Sensor Networks “1st IEEE International Symposium on Telecommunication Technologies” 26-28 Nov 2012, pp 71-75.