General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2012 Vol.4(3): 418-421 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.496

A Novel Algorithm for Detecting Sinkhole Attacks in WSNs

Maliheh Bahekmat, Mohammad Hossein Yaghmaee, Ashraf Sadat Heydari Yazdi, and Sanaz Sadeghi

Abstract—Nowadays with the wide range of applications in wireless sensor networks, there is an increasing need for security of these networks. These networks have been subjected to numerous attacks among which Sinkhole attack is one of the notable ones. In Sinkhole attack, sometimes the adversary node poses itself as a fake base station (BS) and receives all data of the network. It prevents data from reaching the main BS, or changes the received data and then transfers them to the main BS. In this paper, we present an efficient algorithm in terms of energy consumption. In the proposed algorithm, when a node desires to send data to the BS, it firstly sends a control packet directly to the main BS. Then it begins to send data packets to the BS in form of hop by hop routing. When the data packet arrives at the BS, some of its control fields are compared with the same ones of the original control packet. If any changes have been made to these control fields of the data packet, it shows that there is a malicious node; the BS detects it using the proposed strategy. The performance of the proposed method has been evaluated and compared with that of Ngai’s algorithm. The simulation results indicate that the proposed algorithm is more efficient than it.

Index Terms—Wireless sensor networks, sinkhole attack, wormhole, base station, detection.

Maliheh Bahekmat, Ashraf Sadat Heydari Yazdi and Sanaz Sadeghi are with the Department of computer engineering, Ferdowsi University of Mashhad, Iran (e-mail: ma.bahekmat@um.ac.ir).
Mohammad Hossein Yaghmaee was with the Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, USA.

[PDF]

Cite: Maliheh Bahekmat, Mohammad Hossein Yaghmaee, Ashraf Sadat Heydari Yazdi, and Sanaz Sadeghi, "A Novel Algorithm for Detecting Sinkhole Attacks in WSNs," International Journal of Computer Theory and Engineering vol. 4, no. 3, pp. 418-421, 2012.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.