Sinkhole Attacks in Wireless Sensor Networks: A Survey

Wireless sensor networks (WSNs) consist of a large number of nodes, communicating sensor readings to the base stations through other nodes. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing attacks. From a security point of view in WSN, data authenticity, confidentiality, Integrity, and availability are the important security goals. It is in common practice that a security protocol used to be created by focusing a particular attack in WSN. Most renowned attacks in WSN are Sybil attack, Denial of Service attack, wormhole attack, selective attack, HELLO Flooding attack, Sinkhole attack etc. This survey focuses on one of the most challenging routing attacks, called Sinkhole attack. A Sinkhole attack is one of the sternest routing attacks because it attracts surrounding nodes with misleading routing path information and performs data forging or selective forwarding of data passing through it. It can cause an energy drain on surrounding nodes resulting in energy holes in WSNs and it can cause inappropriate and potentially dangerous responses based on false measurements. Researchers had presented several ways to detect and identify sinkhole attacks. This survey reviews related work on Sinkhole attack detection, prevention strategies, and attack techniques and also highlights open challenges in dealing with such attacks. Among many discussed techniques, fuzzy logic-based systems are considered to be good in performance in intruder detection system (IDS).

[1]  Carlos Martín-Vide,et al.  Evolutionary Design of Intrusion Detection Programs , 2007, Int. J. Netw. Secur..

[2]  Jayashree Agarkhed,et al.  Agent-Based QoS Routing for Intrusion Detection of Sinkhole Attack in Clustered Wireless Sensor Networks , 2017 .

[3]  Tassos Dimitriou,et al.  Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks , 2007, ALGOSENSORS.

[4]  Mahdieh Ghazvini,et al.  A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.

[5]  Bharat Bhushan,et al.  Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks , 2018, Wirel. Pers. Commun..

[6]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[7]  Tejinderdeep Singh,et al.  Review on Detection and Prevention of Sink Hole Attack In network , 2016 .

[8]  Umamakeswari Arumugam,et al.  Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks , 2015, J. Sensors.

[9]  Min Song,et al.  Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[10]  Yu-Chee Tseng,et al.  The Coverage Problem in a Wireless Sensor Network , 2005, Mob. Networks Appl..

[11]  Amarvir Singh,et al.  Probing and Removal of Denial of Service Attack in Wireless Sensor Networks , 2017 .

[12]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[13]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  M. A. Rassam,et al.  A sinkhole attack detection scheme in Mintroute wireless Sensor Networks , 2012, 2012 International Symposium on Telecommunication Technologies.

[15]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[16]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[17]  Karl N. Levitt,et al.  A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[18]  Luigi Coppolino,et al.  An Intrusion Detection System for Critical Information Infrastructures using Wireless Sensor Network technologies , 2010, 2010 5th International Conference on Critical Infrastructure (CRIS).

[19]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[20]  L.E. Parker,et al.  Intruder detection using a wireless sensor network with an intelligent mobile robot response , 2008, IEEE SoutheastCon 2008.

[21]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[22]  Deepa Gupta,et al.  Detection of sink Hole Attack in Wireless Sensor Network using Advanced Secure AODV Routing Protocol , 2016 .

[23]  A. K. Daniel,et al.  Recovery of holes problem in wireless sensor networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[24]  Andrew H. Sung,et al.  Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..

[25]  Ahmed I. Saleh,et al.  Energy-efficient routing protocols for solving energy hole problem in wireless sensor networks , 2017, Comput. Networks.

[26]  Naser Alajmi,et al.  Wireless Sensor Networks Attacks and Solutions , 2014, ArXiv.

[27]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[28]  Fatemeh Ghassemi,et al.  An adaptive sinkhole aware algorithm in wireless sensor networks , 2017, Ad Hoc Networks.

[29]  Choong Seon Hong,et al.  A sinkhole attack detection mechanism for LQI based mesh routing in WSN , 2009, 2009 International Conference on Information Networking.

[30]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[31]  Ajith Abraham,et al.  IDEAS: intrusion detection based on emotional ants for sensors , 2005, 5th International Conference on Intelligent Systems Design and Applications (ISDA'05).

[32]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[33]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.

[34]  Prasenjit Choudhury,et al.  An Attack Identification Scheme Using Hierarchical Data Clustering in MANET , 2011 .

[35]  Jung-Min Park,et al.  A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..

[36]  Sandeep Dalal,et al.  Survey on Attacks Pertaining to Wireless Mesh Networks and Approach towards Counter Measures , 2016 .

[37]  Manpreet Kaur,et al.  Detection and Mitigation of Sinkhole Attack in Wireless Sensor Network , 2016, 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE).

[38]  Smita Karmakar,et al.  Holes Detection in Wireless Sensor Networks: A Survey , 2014 .

[39]  Satyajayant Misra,et al.  BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[40]  Habib Youssef,et al.  Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption , 2014, Wireless Personal Communications.

[41]  Wenyu Ma,et al.  Coverage hole detection algorithm without location information in wireless sensor networks , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[42]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[43]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[44]  Rutuja Jadhav,et al.  Security Issues and Solutions in Wireless Sensor Networks , 2017 .

[45]  Aline Carneiro Viana,et al.  Cryptographic protocols to fight sinkhole attacks on tree-based routing in Wireless Sensor Networks , 2009, 2009 5th IEEE Workshop on Secure Network Protocols.

[46]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[47]  Udo W. Pooch,et al.  Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.

[48]  Reza Rafeh,et al.  A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..

[49]  Miroslav Voznák,et al.  Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks , 2015, Wireless Personal Communications.

[50]  G. Mahadevan,et al.  A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).