2012
DOI: 10.1016/j.comcom.2011.09.005
|View full text |Cite
|
Sign up to set email alerts
|

A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis

Abstract: This work focuses on: (1) understanding the impact of selective forwarding attacks on tree-based routing topologies in Wireless Sensor Networks (WSNs), and (2) investigating cryptography-based strategies to limit network degradation caused by sinkhole attacks. The main motivation of our research stems from the following observations. First, WSN protocols that construct a fixed routing topology may be significantly affected by malicious attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 41 publications
0
16
0
Order By: Relevance
“…When a sinkhole route reply message indicating that it has been found the destination with the lowest possible hop count. All nodes along the route back to the source of the route request will store the route towards the sinkhole in the routing table (Fessant et al, 2011). If the real destination is a larger number of hops away from the source than the sinkhole, the route to the sinkhole will be chosen.…”
Section: Methodsmentioning
confidence: 99%
“…When a sinkhole route reply message indicating that it has been found the destination with the lowest possible hop count. All nodes along the route back to the source of the route request will store the route towards the sinkhole in the routing table (Fessant et al, 2011). If the real destination is a larger number of hops away from the source than the sinkhole, the route to the sinkhole will be chosen.…”
Section: Methodsmentioning
confidence: 99%
“…Fessant et al [20] proposed new two cryptographic protocols to increase the detection rate of sinkhole attack. These protocols prevent and detects malicious node from source to destination.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this section, the OPNET modeler simulator is used to evaluate the performance of our proposed trust based design against sinkhole attacks .we evaluate the presented approach effectiveness against sinkhole attack and selective forwarding , and the gain resilience to packet dropping by the malicious nodes in our adaptive trust protocol have compared to resist-0 protocol in [3]. We consider an event driven network model which each sensor periodically sends data to sink or data is sent to sink base on the sink request.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…Compromised nodes in selective forwarding attack are modeled as nodes that drop messages with probability p messages instead of forwarding them. When the probability p=1 we are facing sinkhole nodes [3]. In order to protect WSNs against malicious and selfish behavior, different secure routing protocols have been Manuscript received April 3, 2014; revised June 13, 2014.…”
mentioning
confidence: 99%