A Review on Sinkhole Attack in WSN

Abstract

Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks. Unattended installation of sensor nodes in the environment causes many security threats in the wireless sensor networks. There are many possible attacks on sensor Network such as selective forwarding, jamming, sinkhole, wormhole, Sybil and hello flood attacks. Sinkhole attack is among the most destructive routing attacks for these networks. It may cause the intruder to lure all or most of the data flow that has to be captured at the base station. Once sinkhole attack has been implemented and the adversary node has started to work as Network member in the data routing, it can apply some more threats such as black hole or gray hole. Ultimately this drop of some important data packets can disrupt the sensor networks completely. We have presented some countermeasures against the sinkhole attack.

Authors and Affiliations

Priyanka, Arpit Bansal

Keywords

Related Articles

A Critical Review on Modelling of Industrial Chimney

Chimneys are characterising landmarks of power plants and industrial setups. Chimneys are required to carry vertically and discharge, gaseous products of combustion, chemical waste gases, and exhaust air from and indust...

Access Control Model For Online Social Networks

This We have seen the widespread use of online social networking sites, there are hundreds of millions users can easily share private and public information with online unknown users. For this reason it is important to...

State-Space Modeling of Multi-input Converter

This is a three-switch converter belongs to fifth-order family and performs boosting operation. A new two-input Boost- SEPIC DC-DC converter suitable to draw power from two different dc sources feeding a common dc-bus i...

Controlling and Protection of Three Phase Induction Motor Using PLC

Automation is the process of handling various parameters of process like temperature, flow, etc. without presence of responsible person. In the development of automation controllers the trend has been to move towards so...

Performance Analysis and Coding of Blind Adaptive Fractional – Space Constant Modulus Algorithm

in bandwidth-efficient digital transmission, adaptive algorithm is widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, high definition television (hdtv) set-top...

Download PDF file
  • EP ID EP21043
  • DOI -
  • Views 232
  • Downloads 3

How To Cite

Priyanka, Arpit Bansal (2015). A Review on Sinkhole Attack in WSN. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(7), -. https://europub.co.uk/articles/-A-21043