2020
DOI: 10.1007/s11277-020-07263-9
|View full text |Cite
|
Sign up to set email alerts
|

The Design of a Defense Mechanism to Mitigate Sinkhole Attack in Software Defined Wireless Sensor Cognitive Radio Networks

Abstract: The sink hole attack is a typical wireless sensor network attack. The sink hole node advertises itself as the best route to the sink node or the base station. The nodes in the communication zone of the sink hole node then redirects their observed data to the sink hole node upon receiving the broadcasted supposedly the best route. The sink node receives the packets and then drops them. It can also modify them before relaying them to the sink node or base station. This study proposes a scheme designed to address… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 18 publications
(17 reference statements)
0
7
0
Order By: Relevance
“…The main goal of the attacker in this attack is to draw attention to all traffic from a specified location by exploiting a compromised node. Sinkhole attack is the term for this traffic-gathering method (Karlof & Wagner, 2003) (Sejaphala & Velempini, 2020).…”
Section: Sinkhole Attackmentioning
confidence: 99%
“…The main goal of the attacker in this attack is to draw attention to all traffic from a specified location by exploiting a compromised node. Sinkhole attack is the term for this traffic-gathering method (Karlof & Wagner, 2003) (Sejaphala & Velempini, 2020).…”
Section: Sinkhole Attackmentioning
confidence: 99%
“…For the power dispatching data network, it is very destructive. If you want to identify and defend against SQL injection attacks, you must first understand the process of SQL injection attacks [11,12]. e attacker constructs special user input based on SQL syntax.…”
Section: Analysis and Identification Of Sql Injection Attacksmentioning
confidence: 99%
“…Although grayhole attacks may have lower impact in the overall network, they are also more difficult to be identified, as random drops may be due to malfunctioning of devices. Another ariant of this attack is given by the sinkhole attack, where a node advertises itself as the best route in the network, such that packets are pass through it and are redirected to the sink node and hence discarded [122].…”
Section: A Vulnerabilities and Threatsmentioning
confidence: 99%
“…Data is periodically collected from network's nodes to verify both the data authenticity and consequently assign a trust level. A solution based on count based detection scheme has been proposed by authors in [122] to mitigate sinkhole attacks. Each node in the network needs to report its hop count to the base station, which keeps track of the values reported by each node to detect possible sinkhole attacks.…”
Section: B Security Solutions Challenges and Gapsmentioning
confidence: 99%