2013
DOI: 10.3844/jcssp.2013.1106.1116
|View full text |Cite
|
Sign up to set email alerts
|

A Leader Based Monitoring Approach for Sinkhole Attack in Wireless Sensor Network

Abstract: Security is one of an important factor to be considered seriously in wireless sensor networks. In WSN, in many ways intrusion may occur, in the past decades there is no perfect IDS, without any wasting of resources like time, energy, cost and number of physical items. The main objective is to ensure the security and improve the quality of network by applying a Leader based intrusion detection system in the Wireless Sensor Network (WSN). Here, we are focusing on the attack known as sinkhole attack which is cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…To detect and prevent malicious behaviors in wireless sensor networks, an intrusion detection system based on leader was proposed in [12], and the name of this system is Leader Based Intrusion Detection System (LBIDS). A leader is selected from a group of nodes in the network and monitors these nodes.…”
Section: Existing Systemmentioning
confidence: 99%
“…To detect and prevent malicious behaviors in wireless sensor networks, an intrusion detection system based on leader was proposed in [12], and the name of this system is Leader Based Intrusion Detection System (LBIDS). A leader is selected from a group of nodes in the network and monitors these nodes.…”
Section: Existing Systemmentioning
confidence: 99%
“…If the values are different, then the BS alerts the sensor nodes about the presence of sinkhole node. The authors in [23] propose centralized monitoring approach to detect the sinkhole node in the WSN. The monitoring node (or leader node) is randomly selected from the group of sensor nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The purpose of routing attack is to create a serious threat to the sensor network. The sinkhole is one of the most susceptible threats to the sensor network as referred to in [9,11,21,23,[25][26][27]. It can be extended further with the attacks like selective forwarding, black hole, and HELLO flood to devastate the network transmission [31][32][33].…”
Section: Sinkhole Attackmentioning
confidence: 99%