2016
DOI: 10.18178/ijeee.4.1.74-78
|View full text |Cite
|
Sign up to set email alerts
|

A Realistic Modelling of the Sinkhole and the Black Hole Attacks in Cluster-Based WSNs

Abstract: Due to the positioning in hostile environment, wireless sensor networks (WSNs) are prone to various attacks. Hence, security is one of the most important issues in these networks. Therefore, detecting and preventing several kinds of attacks on WSNs is a popular subject in literature. However, handling these attacks on WSNs requires realistic modeling of these attacks since most of WSNs are application specific. In this paper, two kinds of serious attacks called the sinkhole and the black hole attack are modell… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…1) has three basic components called the BS (sink), the CH and the member sensor node (MN) [18]. The sink is responsible from evaluating the data, which is gathered from the CHs.…”
Section: Evaluation Methodologymentioning
confidence: 99%
“…1) has three basic components called the BS (sink), the CH and the member sensor node (MN) [18]. The sink is responsible from evaluating the data, which is gathered from the CHs.…”
Section: Evaluation Methodologymentioning
confidence: 99%
“…In Abasikeleş-Turgut et al [13], an algorithm has been presented to defend against BH and sinkhole attacks. This algorithm can be applied to low-energy adaptive clustering hierarchy clustering-based sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…The anomaly detection classified into knowledge, statistical, and learning based. The anomaly detection considers the normal behavior of networks, flag the unknown activity and based on the activity it generates an alarm [8]. Black hole, which is a DoS attack MANET attack [9,10], is a type of attack that has a big influence on the network.…”
Section: Introductionmentioning
confidence: 99%