WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS AND EFFECT OF BLACKHOLE AND SINKHOLE ATTACKS

2016 ◽  
Vol 78 (4-3) ◽  
Author(s):  
Raja Waseem Anwar ◽  
Majid Bakhtiari ◽  
Anazida Zainal ◽  
Kashif Naseer Qureshi

The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic. Sinkhole and Blackhole attacks are very common attacks in network, where an attacker advertises un-authorized routing update in network. To deal with these types of attacks, there is a need to tighten the network security and prevent from attackers. In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. The simulation results illustrated that, how these attacks affect the network performance. 

2019 ◽  
Vol 8 (4) ◽  
pp. 2440-2448

Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, takes his secret credentials, and duplicates a large number of nodes with some controlled counterparts. The defense against clone node attacks has become an important research element in the safety of the sensor network. In this study, we classify and examine the different proposals in each category. We also compare the memory and communication cost of different clone node detection approach.


Author(s):  
Sanjeev Ghosh ◽  
Srija Unnikrishnan

Technological advancements in low power integrated circuits and wireless communications have led to the feasibility of using a network of sensors to be used for the collection, processing, analysis, and distribution of important information, collected in a wide variety of environments. Sensor nodes in a wireless sensor network face the issue of scarcity of power and therefore, optimal use of available power is of prime importance. The authors study and analyze a technique that aims to reduce the consumption of power. In this technique the radio of the sensor node is switched on only when the number of packets in a queue exceeds a certain threshold; this however introduces delay in the processing of the packets. The authors analyze the performance of this system with respect to the power consumption and mean waiting time and suggest a way to mitigate the delay. The simulations performed show that the simulation results are close to the theoretical results thus indicating the validity of the technique studied.


Author(s):  
Sara Hebal ◽  
Lemia Louail ◽  
Saad Harous

Protocols for wireless sensor networks are generally designed following the layered protocol stack where layers are independent. Uncorrelated decisions coming from different layers may affect certain metrics such as the latency of communications, the energy consumption, etc. Cross-layer approaches overcome this problem by exploiting the dependencies between the layers. In this article, the authors propose latency and energy mac-aware routing for wireless sensor networks (LEMAR-WSN), a new cross-layer routing approach using information of the TDMA schedule and exploiting the information of the energy consumed by each node in order to optimize the latency of communications and the energy consumption when relaying information to the sink in a wireless sensor network. Simulation results show that the proposed approach improves the average latency of communications up to 20% and the average.


2013 ◽  
Vol 6 (3) ◽  
pp. 351-358 ◽  
Author(s):  
Sonia Goyal ◽  
Manjeet Singh Patterh

Many applications of wireless sensor networks (WSN) require information about the geographical location of each sensor node. Devices that form WSN are expected to be remotely deployed in large numbers in a sensing field, and to self -organize to perform sensing and acting task. The goal of localization is to assign geographical coordinates to each device with unknown position in the deployment area. Recently, the popular strategy is to apply optimization algorithms to solve the localization problem. In this paper, the bat algorithm is implemented to estimate the sensor‟s position.


2018 ◽  
Vol 15 (3) ◽  
pp. 569-583 ◽  
Author(s):  
Lei Wang ◽  
Weihua Wu ◽  
Junyan Qi ◽  
Zongpu Jia

For all of types of applications in wireless sensor networks (WSNs), coverage is a fundamental and hot topic research issue. To monitor the interest field and obtain the valid data, the paper proposes a wireless sensor network coverage optimization model based on improved whale algorithm. The mathematic model of node coverage in wireless sensor networks is developed to achieve full coverage for the interest area. For the model, the idea of reverse learning is introduced into the original whale swarm optimization algorithm to optimize the initial distribution of the population. This method enhances the node search capability and speeds up the global search. The experiment shows that this algorithm can effectively improve the coverage of nodes in wireless sensor networks and optimize the network performance.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 153
Author(s):  
Harkesh Sehrawat ◽  
Yudhvir Singh ◽  
Vikas Siwach

A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sinkhole attack is one of the security attacks which try to disturb the ongoing communication in wireless sensor network. In sinkhole attack, the intruder or the malicious node try to attract the network traffic towards itself, that sensor nodes will pass data packets through this compromised node thereby manipulating messages which sensor nodes are transferring to the base station. In this paper we analyze the impact of Sinkhole attack on AODV protocol under various conditions. We analyzed the impact of Sinkhole attack on AODV protocol with varying number of attacker nodes.  


Author(s):  
Miao Ma

One of the severe security threats in wireless sensor network is false data injection attack, that is, the compromised sensors forge the events that do not occur. To defend against false data injection attack, six en-route filtering schemes in a homogeneous sensor network are described. Furthermore, one sink filtering scheme in a heterogeneous sensor network is also presented. We find that deploying heterogeneous nodes in a sensor network is an attractive approach because of its potential to increase network lifetime, reliability, and resiliency.


Security threats are vulnerable in recent times. Kaspersky intelligence report confirms that clustering and attacks makes crucial impact on the network as compared with other security attacks in wireless based environment .The current work focus on clustering of nodes in WSNs. Cat swarm optimization (CSO) algorithm is one of the bio-inspired algorithm and implemented for optimization of nodes to find a better route to transmit data packets in WSN. Also the work focuses on the presence of Distributed Monitoring Approach to evaluate the seek or hunt mode and tracing mode nodes for better improvement in clustering the network. The network recital parameters such as ratio of delivery of data packets, and transmission capacity usage are analyzed to detect network flow in WSN. Reviews have been performed with the analysis of network performance with some of the existing techniques


2016 ◽  
Vol 8 (12) ◽  
pp. 168781401668239 ◽  
Author(s):  
Ning Wang ◽  
Yingbin Fu ◽  
Jiao Zhao ◽  
Liwei Chen

This article analyzes the node importance in linear wireless sensor networks, which can be used to identify the key states of nodes that affect the wireless sensor network performance most. First, the sensor energy can be divided into energy of sensing event, energy of transmitting packets, and energy of receiving packets. The node residual energy of after data flow transmission in linear wireless sensor networks from source nodes and relay nodes is evaluated. Second, the node state is divided into four states based on the data packets transmitting. From the view of reliability theory, a data-flow model is analyzed to calculate the state probability of source node and relay node in the time period [0, t]. Third, the node importance is analyzed, and the ranking of node importance values can be used by designers and managers to identify the most important node for improving the wireless sensor network system reliability. At last, a numerical example is given to demonstrate the proposed methods.


Author(s):  
Karishma Dobhal ◽  
Rohan Varma ◽  
Varun Barthwal ◽  
M.M.S. Rauthan

Wireless Sensor Network is organized by arranging a huge number of sensor nodes in a region to the investigation of normally remote locations. A Wireless sensor network contains various applications such as landslide detec­tion, automotive application, health, noise level, environmental, vehicular movement, and battlefield. A Sensor node has different components to complete the work for sensing the data, transmitting, and processing the data into the network. Security is a very challenging issue in the WSNs. Various security threats and attacks may affect or damage the functioning (activity) of these networks. Attack divided the main two types active and passive.  This paper focuses on several security attacks like Blackhole, fabrication, Sybil, DoS, sinkhole, wormhole, flood­ing. We have also explained security protocols are 3 categories.  Data-Centric, Geographic, and hierarchical pro­tocol. Other are SPIN, LiSP, LEDs, LLSP, LEACH protocols. We explain the term attack threat, vulnerabilities, and security requirements.


Sign in / Sign up

Export Citation Format

Share Document