International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.7, No.3, Feb. 2015

Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count

Full Text (PDF, 405KB), PP.50-56

Views:346   Downloads:24


Md. Ibrahim Abdullah, Mohammad Muntasir Rahman, Mukul Chandra Roy

Index Terms

Sinkhole Attack;Wireless Sensor Network;Routing Attack;Hop distance


Nowadays, Wireless Sensor Networks (WSNs) are widely used in many areas, especially in environment applications, military applications, queue tracking, etc. WSNs are vulnerable to different types of security attacks due to various constraints such as broadcasted nature of transmission medium, deployment in open or hostile environment where they are not physically protected, less memory, and limited battery power. So, security system is the crucial requirements of these networks. One of the most notably routing attacks is the sinkhole attack where an adversary captures or insert nodes in the sensor field that advertise high quality routes to the base station. In this paper, a mechanism is proposed against sinkhole attacks which detect malicious nodes using hop counting. The main advantage of the proposed technique is that, a node can detects malicious nodes only collaborating with the neighbor nodes without requiring any negotiation with the base station. Simulation result shows that, the proposed technique successfully detects the sinkhole nodes for large sensor field.

Cite This Paper

Md. Ibrahim Abdullah, Mohammad Muntasir Rahman, Mukul Chandra Roy,"Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count", IJCNIS, vol.7, no.3, pp.50-56, 2015.DOI: 10.5815/ijcnis.2015.03.07


[1]I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey of sensor networks", IEEE Communications, vol. 40(8), pp. 102-114, 2002.

[2]C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," in Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003. pp. 293-301.

[3]A. Wood and J. Stankovic, "Denial of service in sensor networks", IEEE Computer, vol. 35(10), pp. 54-62, 2002. 

[4]T. Roosta, S. Shieh and S. Sastry, "Taxonomy of Security Attacks in Sensor Networks and Countermeasures", Berkeley, California, University Press. 

[5]Y. Xu, G. Chen, J. Ford and Fillia Makedon, "Detecting Wormhole Attacks in Wireless Sensor Networks" IFIP International Federation for Information Processing, Volume 253, Critical Infrastructure Protection, Pages 267-279, 2007. 

[6]E. C. H. Ngai, J. Liu and M. R. Lyu, "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks," in Proc. IEEE ICC., pp. 3383-3389, June 2006.

[7]B. G. Choi, E. J. Cho, J. Ho Kim, C. S. Hong, and J. H. Kim, "A Sinkhole Attack Detection Mechanism for LQI based Mesh Routing in WSN," in Proc. ICOIN 2009, pp. 1-5, Jan 2009. 

[8]Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," in Proc. of the 6th ACM MobiCom, Aug 2000, pp. 275-283.

[9]B. Karp and H. T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," in Proc. of the 6th ACM MobiCom, Aug 2000, pp. 243-254. 

[10]D. Dallas, C. Leckie, and K. Ramamohanarao, "Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks," in ICON '07: Proceedings of the 15th IEEE International Conference on Networks, Adelaide, SA, 2007, pp. 176–181. 

[11]A. A. Pirzada and C. McDonald, "Circumventing sinkholes and wormholes in wireless sensor networks," in IWWAN '05: Proceedings of International Workshop on Wireless Ad-hoc Networks, 2005.

[12]L. Hu and D. Evans, "Localization for Mobile Sensor Networks," in Proc. of the 10th ACM MobiCom, Sep 2004, pp. 45-57. 

[13]T. S. Rappaport. "Wireless communications: principles and practice", Prentice Hall, 2nd edition, 2002. 

[14]Fei Hu, Waqaas Siddiqui, Krishna Sankar, "Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing", Computer Networks, Science Direct, Elsevier, Vol. 51 (2007), pp 285–308.