• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2012 Vol.4(3): 418-421 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.496

A Novel Algorithm for Detecting Sinkhole Attacks in WSNs

Maliheh Bahekmat, Mohammad Hossein Yaghmaee, Ashraf Sadat Heydari Yazdi, and Sanaz Sadeghi
Abstract—Nowadays with the wide range of applications in wireless sensor networks, there is an increasing need for security of these networks. These networks have been subjected to numerous attacks among which Sinkhole attack is one of the notable ones. In Sinkhole attack, sometimes the adversary node poses itself as a fake base station (BS) and receives all data of the network. It prevents data from reaching the main BS, or changes the received data and then transfers them to the main BS. In this paper, we present an efficient algorithm in terms of energy consumption. In the proposed algorithm, when a node desires to send data to the BS, it firstly sends a control packet directly to the main BS. Then it begins to send data packets to the BS in form of hop by hop routing. When the data packet arrives at the BS, some of its control fields are compared with the same ones of the original control packet. If any changes have been made to these control fields of the data packet, it shows that there is a malicious node; the BS detects it using the proposed strategy. The performance of the proposed method has been evaluated and compared with that of Ngai’s algorithm. The simulation results indicate that the proposed algorithm is more efficient than it.

Index Terms—Wireless sensor networks, sinkhole attack, wormhole, base station, detection.

Maliheh Bahekmat, Ashraf Sadat Heydari Yazdi and Sanaz Sadeghi are with the Department of computer engineering, Ferdowsi University of Mashhad, Iran (e-mail: ma.bahekmat@um.ac.ir).
Mohammad Hossein Yaghmaee was with the Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, USA.


Cite: Maliheh Bahekmat, Mohammad Hossein Yaghmaee, Ashraf Sadat Heydari Yazdi, and Sanaz Sadeghi, "A Novel Algorithm for Detecting Sinkhole Attacks in WSNs," International Journal of Computer Theory and Engineering vol. 4, no. 3, pp. 418-421, 2012.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com