Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks

In wireless sensor network (WSN), the sensors are deployed and placed uniformly to transmit the sensed data to a centralized station periodically. So, the major threat of the WSN network layer is sinkhole attack and it is still being a challenging issue on the sensor networks, where the malicious node attracts the packets from the other normal sensor nodes and drops the packets. Thus, this paper proposes an Intrusion Detection System (IDS) mechanism to detect the intruder in the network which uses Low Energy Adaptive Clustering Hierarchy (LEACH) protocol for its routing operation. In the proposed algorithm, the detection metrics, such as number of packets transmitted and received, are used to compute the intrusion ratio (IR) by the IDS agent. The computed numeric or nonnumeric value represents the normal or malicious activity. As and when the sinkhole attack is captured, the IDS agent alerts the network to stop the data transmission. Thus, it can be a resilient to the vulnerable attack of sinkhole. Above all, the simulation result is shown for the proposed algorithm which is proven to be efficient compared with the existing work, namely, MS-LEACH, in terms of minimum computational complexity and low energy consumption. Moreover, the algorithm was numerically analyzed using TETCOS NETSIM.

[1]  Mohammed A. Abuhelaleh,et al.  Armor-LEACH - Energy Efficient, Secure Wireless Networks Communication , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.

[2]  Ali Farrokhtala,et al.  Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[3]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[4]  Soojin Lee,et al.  A Specification Based Intrusion Detection Mechanism for the LEACH Protocol , 2012 .

[5]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[6]  M. Shankar,et al.  Performance Evaluation of LEACH Protocol in Wireless Network , 2012 .

[7]  Li Qing,et al.  Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks , 2006, Comput. Commun..

[8]  Jasbir Kaur,et al.  Improved LEACH Protocol for Wireless Sensor Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Azeddine Bilami,et al.  Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[10]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[11]  Amrinder Kaur,et al.  Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network , 2013 .

[12]  Fei Du,et al.  An Improvement of LEACH Routing Protocol Based on Trust for Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  A. Roy DRPGAC: DETECTING AND PREVENTING MALICIOUS ACTIVITIES IN WIRELESS SENSOR NETWORKS , 2014 .

[14]  Xuefeng Zheng,et al.  TCloud: A Dynamic Framework and Policies for Access Control across Multiple Domains in Cloud Computing , 2013, ArXiv.

[15]  Xue Deng An intrusion detection system for cluster based wireless sensor networks , 2013, 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC).

[16]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[17]  A. Riad,et al.  Recent Advances of Secure Clustering Protocols in Wireless Sensor Networks , 2014 .

[18]  Vijay Laxmi,et al.  Wireless Sensor Networks: Attack Models and Detection , 2012 .

[19]  Wendi B. Heinzelman,et al.  Application-specific protocol architectures for wireless networks , 2000 .

[20]  Murat Dener,et al.  Security Analysis in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[21]  D. Udaya Suriya Rajkumar,et al.  A Leader based Monitoring Approach for sinkhole Attack in Wireless Sensor Network , 2013, J. Comput. Sci..

[23]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[24]  M. A. Rassam,et al.  A sinkhole attack detection scheme in Mintroute wireless Sensor Networks , 2012, 2012 International Symposium on Telecommunication Technologies.

[25]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[26]  United Arab Emirates,et al.  Dealing with Sinkhole Attacks in Wireless Sensor Networks , 2013 .

[27]  Vijay Laxmi,et al.  Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.

[28]  Rohit Vaid,et al.  V LEACH: AN ENERGY EFFICIENT COMMUNICATION PROTOCOL FOR WSN , 2013 .

[29]  Tejinderdeep Singh,et al.  Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool , 2013 .

[30]  Krishan Kumar,et al.  Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[31]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[32]  Mohamed Mostafa Abdel-Azim,et al.  New Trends in Secure Routing Protocols for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[33]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[34]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[35]  Souheila Bouam,et al.  Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..

[36]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[37]  Wang Sheng,et al.  Performance Comparison of LEACH and LEACH-C Protocols by NS2 , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[38]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[39]  Mohammad Hossein Yaghmaee,et al.  A Novel Algorithm for Detecting Sinkhole Attacks in WSNs , 2012 .

[40]  Eman Shaaban,et al.  Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.

[41]  Sandeep Waraich,et al.  A Comparative Study on LEACH Routing Protocol and Its Variants in Wireless Sensor Networks: A Survey , 2014 .

[42]  Virendra Pal Singh,et al.  Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .

[43]  Sugandha Gupta,et al.  Survey of Intrusion Detection Techniques in LEACH , 2014 .

[44]  Rajashree V Biradar,et al.  Multihop Routing In Self-Organizing Wireless Sensor Networks , 2011 .

[46]  Yeong-Jee Chung,et al.  Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[47]  Alireza Keshavarz-Haddad,et al.  Watchdog-LEACH: A new method based on LEACH protocol to Secure Clustered Wireless Sensor Networks , 2013, ArXiv.

[48]  Sanjay Kumar Jena,et al.  A survey on secure hierarchical routing protocols in wireless sensor networks , 2011, ICCCS '11.

[49]  Eui-Nam Huh,et al.  A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.

[50]  Minghao Tang,et al.  LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).