Improved Cross-Layer Detection and Prevention of Sinkhole Attack in WSN

Improved Cross-Layer Detection and Prevention of Sinkhole Attack in WSN

Ambika N.
Copyright: © 2021 |Pages: 14
DOI: 10.4018/978-1-7998-3479-3.ch037
(Individual Chapters)
No Current Special Offers


Sensors are tiny devices deployed to monitor any object of interest. As these devices are unsupervised, they are liable to get compromised. The chapter suggests to minimize sinkhole attack in the network. The work is an improvement of the cross-layer detection method. The doings of the network and MAC layer are brought in together to enhance security in the network. The proposed study uses signal strength and node identification to track the malicious node in the network. The work suffixes a hash code to enhance security in the network. The work aids in bringing forward secrecy. The energy is reduced by 18.18%, and the security is increased by 22% with the comparison to the previous work.
Chapter Preview


The proposed work provides solution to tackles and minimizes the occurrences of Sinkhole attack in the network. Many authors have provided their suggestions to tackle the same. This section provides a brief history of the same.

In (Ngai, Liu, & Lyu, 2006) network flow graph is utilized to detect sinkhole attack. The selective forwarding activity is considered to make the detection of the attack. The nodes are monitored to find the missing data from the region. A statistical methodology is adopted to accomplish the task. Using the mean of the data sent and amount of data collected using sliding window a measure is calculated. This calculated value is compared against the threshold to measure the suspicious activity in the respective area. The base station gauges the suspected area. After detecting the affected area the base station forwards a request message to the area. The message contains the IDs of all the affected nodes and is made to move from hop to hop. A timestamp is included in the message to avoid replay of the messages. The respective nodes sign the message with its private key. After receiving the message from the nodes, the receiving reply with the base station with its message. The message contains details of IDs, ID of the next hop and estimated cost [hop-count, data rate]. The base station constructs the tree using the information from the received message. The area under sinkhole attack follows a pattern where all the packets move towards the invaded node. Using this methodology the adversary can be detected.

Key Terms in this Chapter

Sinkhole Attack: This is a kind of attack where the malicious nodes broadcast bogus messages to the nodes within the vicinity to bring them into confidence. The legitimate nodes transmit their packets to the malicious nodes which are later used to launch different kinds of attacks.

Security Methodology: The measures used to bring in security to the nodes and the transmitted data in the network.

Public Key: Two keys are generated in public key cryptography. The public key is broadcasted by the source node to the nodes of the network. The nodes use the same to encrypt the messages before transmission. The source decrypts the received message using the private key.

Signal Strength: The nodes based on their capacity transmit the packets with certain signal strength.

Wireless Sensor Network: Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated sensors deployed to monitor/track any object of interest.

Energy Consumption: The amount of energy consumed using different methodologies in the proposed work

Hash Code Generation: A hashing algorithm is used to generate the hash code (an integer value) accepting the identification of the nodes as the input.

Complete Chapter List

Search this Book: