An Efficient Intruder Detection System against Sinkhole Attack in Wireless Sensor Networks: A Review
Keywords:
Wireless Sensor Networks, Applications of WSN, Routing in WSN, Intrusion Detection System, Sinkhole AttackAbstract
This Wireless sensor network is deal with sensing the information from deployed area. For data transmission from source node to destination node various routing protocols is used. Due to routing the energy consumption occurred in the network. In wireless sensor network energy consumption is one of the main problems because every node is operated by battery. In wireless sensor network energy utilization is one of the primary issues in light of the fact that each node is operated by battery. In wireless sensor networks, sensors expend energy both in detecting information and transmitting the detected information to a base station. The power utilization for transmitting information is an exponential function of the separation from the sensor to the base station. Power utilization for detecting information is controlled by the kind of sensor and in addition the routing protocol. The issue in this paper is to build the life time of the sensor systems. To have expansive system life time’s everything nodes need to minimize their energy utilization.
References
S. Misra, P.V. Krishna, K.I. Abraham “Energy efficient learning solution for intrusion detection in Wireless Sensor Networks” Second International Conference on Communication Systems and Networks, pp. 1-6, 2010.
Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016.
J. Petajajarvi, H. Karvonen “Soft handover method for mobile wireless sensor networks based on 6LoWPAN” International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, pp. 1 – 6, DOI: 10.1109/DCOSS.2011.5982208
Qingtian Sun, Shunfu Jin, Chen Chen “Energy analysis of sensor nodes in WSN based on discrete-time queueing model with a setup” Chinese Control and Decision Conference (CCDC), 2010, pp. 4114 – 4118, DOI: 10.1109/CCDC.2010.5498425.
J.M.L.P. Caldeira, J.J.P.C. Rodrigues, P. Lorenz, L. Shu “Intra-mobility handover enhancement in healthcare wireless sensor networks” 14th International Conference one-Health Networking, Applications and Services (Healthcom), 2012, pp. 261 – 266.
R. Silva, J. Sa Silva, M. Simek, F. Boavida “A new approach for multi-sink environments in WSNs” International Symposium on Integrated Network Management, 2009. IM '09. IFIP/IEEE, pp. 109 – 112.
X. Chen, P. Yu “Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes” IEEE 3rd International Conference on Biomedical Engineering and Informatics (BMEI), 2010, pp. 2863 – 2867.
Yong-Sik Choi, Young-Jun Jeon, Sang-Hyun Park “A study on sensor nodes attestation protocol in a Wireless Sensor Network”, IEEE 12th International Conference on Advanced Communication Technology (ICACT), 2010, Volume: 1, pp. 574-579.
S. Kwon, J. H. Ko, Jeong kyu Kim and Cheeha Kim, “Dynamic timeout for data aggregation in wireless sensor networks”, Elsevier Journal of Computer Networks, 21 February 2011, pp. 650-664.
R. L. Balla, V. Kotoju, "Sinkhole Attack Detection And Prevention in Manet & Improving The Performance of AODV Protocol", Compusoft, An International Journal of Advanced Computer Technology, 2013, PP 210-214.
X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, "Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks," IEEE Conference on WSN, 2003, pp 23-32.
L. Doherty, K. S. J. Pister, and L. E. Ghaoui, "Convex Position Estimation in Wireless Sensor Networks," International conference on INFOCOM, 2001, pp 230-241.
T. Dimitriou, I. Krontiris, T. Giannetsos and M. Mpasoukos, “Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks”, In Algorithmic Aspects of Wireless Sensor Networks, pp. 150-161.Springer Berlin Heidelberg, 2008.
E. C. H. Ngai, J. Liu, and M. R. Lyu, “An Efficient Intruder Detection Algorithm against Sinkhole Attacks in Wireless Sensor Networks,” Computer Communications, vol. 30, pp. 2353-2364, 2007.
Charanpreet Kaur and Amit Chhabra, "An Energy Efficient Multihop Routing Protocol for Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-07, Page No (86-91), Jul -2015.
Liping Teng, Yongping Zhang, "Sera: A Secure Routing Algorithm against Sinkhole Attacks For Mobile Wireless Sensor Networks", Second International Conference on Computer Modeling and Simulation 2010, PP 79-82.
Nisarg Gandhewar, Rahila Patel, "Detection & Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network", Fourth International Conference on Computational Intelligence and Communication Networks, 2012, PP 714-718.
I. Krontiris, T. Dimitriou, F.C. “Freiling Towards intrusion detection in wireless sensor networks”. In: Proceedings of the 13th European Wireless Conference, Paris, France (April 2007).
Gisung Kim, Younggoo Han, Sehun Kim, “A cooperative-sinkhole detection method for mobile ad hoc networks”, International Journal of Electronics and Communication 64 (2010) 390–397
NS-2, The ns Manual (formally known as NS Documentation) available at following link:http: //www. isi.edu/nsnam/ ns/do
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
