{"title":"一种新的无线传感器网络天坑攻击隔离方法","authors":"P. Kala, A. Agrawal, Rishi Sharma","doi":"10.1109/Confluence47617.2020.9057981","DOIUrl":null,"url":null,"abstract":"Maintaining security and energy consumption of wireless sensor networks is a bit difficult due to non-availability of any central controller. They are also self-configuring in nature. Such types of networks are susceptible to several types of attacks. In this paper, we focus on one such attack called sink hole attack in which the malicious nodes spoof identification of base station and act like base station. The sensor nodes start transmitting data to malicious node instead of base station. This paper proposes a new technique to identify and eliminate such malicious nodes using identity verification to provide a secure environment for communication in the network. Proposed technique is implemented in NS2 and extensive simulations are performed to obtain the results. Results indicate the superiority of the proposed approach over existing approaches in terms of (packet loss, energy consumption, delay and throughput).","PeriodicalId":180005,"journal":{"name":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"A Novel Approach for Isolation of Sinkhole Attack in Wireless Sensor Networks\",\"authors\":\"P. Kala, A. Agrawal, Rishi Sharma\",\"doi\":\"10.1109/Confluence47617.2020.9057981\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Maintaining security and energy consumption of wireless sensor networks is a bit difficult due to non-availability of any central controller. They are also self-configuring in nature. Such types of networks are susceptible to several types of attacks. In this paper, we focus on one such attack called sink hole attack in which the malicious nodes spoof identification of base station and act like base station. The sensor nodes start transmitting data to malicious node instead of base station. This paper proposes a new technique to identify and eliminate such malicious nodes using identity verification to provide a secure environment for communication in the network. Proposed technique is implemented in NS2 and extensive simulations are performed to obtain the results. Results indicate the superiority of the proposed approach over existing approaches in terms of (packet loss, energy consumption, delay and throughput).\",\"PeriodicalId\":180005,\"journal\":{\"name\":\"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Confluence47617.2020.9057981\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Confluence47617.2020.9057981","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Novel Approach for Isolation of Sinkhole Attack in Wireless Sensor Networks
Maintaining security and energy consumption of wireless sensor networks is a bit difficult due to non-availability of any central controller. They are also self-configuring in nature. Such types of networks are susceptible to several types of attacks. In this paper, we focus on one such attack called sink hole attack in which the malicious nodes spoof identification of base station and act like base station. The sensor nodes start transmitting data to malicious node instead of base station. This paper proposes a new technique to identify and eliminate such malicious nodes using identity verification to provide a secure environment for communication in the network. Proposed technique is implemented in NS2 and extensive simulations are performed to obtain the results. Results indicate the superiority of the proposed approach over existing approaches in terms of (packet loss, energy consumption, delay and throughput).