2015
DOI: 10.7763/ijiet.2015.v5.561
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks

Abstract: 520 Abstract-As wireless sensor networks are characterized by severely constrained node resources, low communication range, low memory capacity and dynamic nature of WSNs, implementing security functionality and detection protocols to protect against adversary nodes becomes a challenging task. It is very likely that the encryption keys in the sensor nodes are accessed by attacker entities. The compromised nodes can launch sinkhole or wormhole attack to prevent the arrival of important information to the base … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Second, the novel design and evaluation of two simple and resilient topology-based reconfiguration protocols that broadcast cryptographic values. Omid Naderi et al [22] presented an efficient algorithm to mitigate the effects of sinkhole attack and provide an entropy-based trust model. L. Coppolino et al [23] presented an Intrusion Detection System (IDS), which can protect a CI from attacks directed to its WSN-based parts.…”
Section: Related Workmentioning
confidence: 99%
“…Second, the novel design and evaluation of two simple and resilient topology-based reconfiguration protocols that broadcast cryptographic values. Omid Naderi et al [22] presented an efficient algorithm to mitigate the effects of sinkhole attack and provide an entropy-based trust model. L. Coppolino et al [23] presented an Intrusion Detection System (IDS), which can protect a CI from attacks directed to its WSN-based parts.…”
Section: Related Workmentioning
confidence: 99%
“…(i) Greyhole/selective forwarding [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34] (ii) Wormhole [35][36][37][38][39][40][41][42][43] (iii) Sinkhole [26,[42][43][44][45][46][47][48][49][50] (iv) Sybil attacks [51][52][53][54][55][56][57][58][59] Since we did not find a significant number of articles for other attacks, we overview articles only for the abovementioned attacks.…”
Section: Proposed Trust Mechanisms To Secure Routingmentioning
confidence: 99%
“…On the other hand, the last two forms of the attack are easier to detect due to uniform behavior. [17][18][19][20][22][23][24][25][26][27][28][29][30][31] are based on the watchdog mechanism. Watchdog mechanism can be used by nodes which are located on each other's transmission range.…”
Section: Trust Mechanisms To Secure Routing Againstmentioning
confidence: 99%
See 2 more Smart Citations