Two-Way Authentication Algorithm For Sinkhole Attack Isolation in WSN
Two-Way Authentication Algorithm For Sinkhole Attack Isolation in WSN
ISSN No:-2456-2165
Abstract:- Wireless sensor networks (WSN) are battery with a short lifespan, and because of physical
networks that are self-configuring and run without any constraints, their replacement is impractical.Furthermore,
central coordinator. Security and energy consumption any number of sensor nodes must be able to scale up the
are a big problem for wireless sensor networks because design and protocol of the sensor networks. As the lifetime
of these network properties. The malicious nodes that of the battery can be extended on the off chance that one can
join the network cause security attacks.In terms of find out how to minimize the contact calculation(Dr. G.
active and passive attacks, it is possible to distinguish Padmavathi, Mrs. D. Shanmugapriya, 2009). Consumption
attacks. In the active form of attack, the sinkhole assault. can be minimized in the sensing energy subsystem by using
The malicious nodes in the sinkhole attack spoof the low-power hardware components for energy-efficient
base station's identity and behave like the base station. routing protocols, such as Hybrid Energy-Efficient
Instead of base stations, the sensor nodes start Distributed (HEED).Clustering involves grouping nodes
transmitting data to malicious nodes. Cluster heads are into clusters and regularly selecting cluster heads so that
chosen on the basis of energy, distance, to minimize people from a cluster can talk to their cluster heads, and
energy consumption of the network LEACH protocol, these cluster heads send to a base station aggregated data
which divides the entire network into clusters and obtained from their individuals.There is a cluster head in
clusters. Therefore, the total life of the network is each cluster, and from that cluster there are individual rest
decreased and the amount of energy consumed is nodes. Clustering results in a two-level order in which the
increased when a sinkhole attack occurs.In this research higher level is formed by cluster heads while component
paper, the latest method is designed to identify and nodes frame the lower level.(G.H. Raghunandan, IEEE
isolate malicious nodes from the network. This 2011). Compared to component nodes, because the cluster
algorithm works by using recognition to quickly classify head constantly transmits data over longer separations, they
attacks. The proposed algorithm is implemented in NS2 lose more energy. The clustering technique is used to
and those parameters are evaluated in terms of minimize the consumption of resources. LEACH is the
performance. As opposed to current techniques, our protocol that is the most powerful wireless sensor network
proposed technique performs well in terms of all clustering protocol.The cluster heads in the LEACH
parameters. protocol are selected randomly on the network. The head of
the cluster gets its sensor nodes based on size. Under the
Keywords:- Active, Attack, Sinkhole, Malicious, LEACH, cluster head will come the nodes which are nearest to the
WSN cluster head. On the basis of energy, the clusters are
randomly modified.The cluster heads in the LEACH
I. INTRODUCTION protocol are picked at random on the network. Based on
size, the cluster head gets its sensor nodes. Under the cluster
As of late, cellular network infrastructure and mobile head, the nodes that are nearest to the cluster head will
communications have seen a flourishing evolution. A come. On the basis of energy, the clusters are altered
wireless sensor network is the array of various sensing randomly.Safety assaults are commonly known as active
devices in such a way that information relevant to the and passive assaults. Active attacks are those that
surrounding environment of a particular region can be significantly decrease the efficiency of the network in terms
known. They have the potential to change life and the of different parameters. Passive attacks are those that do not
complexities of system building. Different programs include impact the efficiency of the network, but can cause active
sensor-based location detection with sensor networks, attacks in the future.
personal health screen and movement detection(J.-C. Wang,
C.-H. Lin, E. Siahaan, B.-W. Chen, and H.-L. Chuang, A wormhole attack enables an attacker to form a
2014). Within these networks, the size of multiple tunnel between two distant WSN locations, and the packets
limitations such as battery size, processors, memory storage are transmitted through an in-band or out-of-band channel
of information and so on is significant. With the assistance using that tunnel. (Dong D, 2008). Thus, the wormhole
of different optimization algorithms, the use of energy must tunnel forms a pair of attackers. A misapprehension that
be progressed within the networks.Inside the detected and they are similar to each other makes two distant nodes;
routing data sent through the WSNs, different time however, it is not so in reality. The current wormhole will
constraints are present. Sensor nodes typically depend on a
Parameter Values
Type of antenna Omi-directional
Area 800X800meters
No. of nodes 38
Routing Protocol LEACH
Channel type Wireless channel
Packet size 512byte
Mobility model Two ray ground propagation model
Simulation Time 50s
Traffic Type CBR(UDP)
Table 1:- Simulation Parameters
The performance of the proposed and current throughput. The study can be expanded in the future to
algorithm is compared, as shown in Figure 2, so that it is enhance the detection of sinkhole attacks using the key
analyzed that throughput will be increased at a steady rate exchange mechanism.
due to the isolation of the sink hole attack in the network.
REFERENCES
Time Existing Algorithm Proposed Algorithm
[1]. C.-C. Su, K.-M. C.-H.-F. (2010). The new intrusion
4 second 68 packets 76 packets prevention and detection approaches for clustering-
8 second 140 packets 172 packets based sensor networks . IEEE Wireless
Communications and Networking Conference.
14 second 260 packets 420 packets [2]. Daniel Dallas, C. L. (2016). Hop-Count Monitoring:
Detecting Sinkhole Attacks in Wireless Sensor
Table 3:- Throughput Comparisons Networks. 15th IEEE International Conference on
Networks, ICON, (pp. 176-181).
V. CONCLUSION [3]. Dong D, L. M. (2008). Topological detection on
wormholes in wireless ad hoc and sensor networks.
WSN is the network in this study in which different IEEE Transactions on Mobile Computing, pp. 698–711.
sensor nodes are installed so that it is possible to monitor [4]. Dr. G. Padmavathi, Mrs. D. Shanmugapriya. (2009). A
the surrounding environmental conditions. The sinkhole Survey of Attacks, Security Mechanisms and
attack decreases the efficiency of the LEACH protocol and Challenges in Wireless Sensor Networks. International
the sinkhole attack is detected and isolated by our Journal of Computer Science and Information Security,
approach.We get the output analyzed in terms of energy 4, 1-9.
consumption is minimized by 26 percent and throughput is [5]. Edith C. H. Ngai, J. L. (2006). On the Intruder
increased by 20 percent by conducting experiments in WSN Detection for Sinkhole Attack in Wireless Sensor
including sinkholes in the code.The findings show that the Networks. IEEE International Conference on
proposed malicious node isolation work improves network Communications, 8, p. 33833389.
performance in terms of energy consumption and