Research Article Open Access

A LEADER BASED MONITORING APPROACH FOR SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK

D. Udaya Suriya Rajkumar1 and Rajamani Vayanaperumal2
  • 1 Sathyabama University, India
  • 2 , India

Abstract

Security is one of an important factor to be considered seriously in wireless sensor networks. In WSN, in many ways intrusion may occur, in the past decades there is no perfect IDS, without any wasting of resources like time, energy, cost and number of physical items. The main objective is to ensure the security and improve the quality of network by applying a Leader based intrusion detection system in the Wireless Sensor Network (WSN). Here, we are focusing on the attack known as sinkhole attack which is considered as the biggest threat in wireless sensor network which spoils the complete communication and a data loss between a pair of nodes as source node and a destination node. In order to provide a complete solution to detect and avoid sinkhole attack a Leader Based Intrusion Detection System (LBIDS) is proposed. In this approach a leader is elected for each group nodes within the network, region wise and it do compares and calculates the behavior of every node, logically executes our detection module and monitors each node behaviour within the cluster for any sinkhole attack to occur. When a node gets detected as a compromised node, it informs that nodes status to the other leader within the WSN, so all the leaders in the network knows about the sink hole node information and the leaders stop communication with sinkhole Node.

Journal of Computer Science
Volume 9 No. 9, 2013, 1106-1116

DOI: https://doi.org/10.3844/jcssp.2013.1106.1116

Submitted On: 31 January 2013 Published On: 6 August 2013

How to Cite: Rajkumar, D. U. S. & Vayanaperumal, R. (2013). A LEADER BASED MONITORING APPROACH FOR SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK. Journal of Computer Science, 9(9), 1106-1116. https://doi.org/10.3844/jcssp.2013.1106.1116

  • 3,146 Views
  • 3,179 Downloads
  • 10 Citations

Download

Keywords

  • Energy Efficiency
  • IDS
  • Illegal Node
  • LBIDS
  • Node Status
  • Transmission Range
  • WSN