A non cryptographic method of sink hole attack detection in wireless sensor networks

A Wireless Sensor network (WSN) consists of large number of low cost low power sensor nodes. The nature of wireless sensor networks makes them very attractive to attackers. One of the most popular and serious attacks in wireless sensor networks is sink hole attack and most existing protocols to defend against this attack used cryptographic methods with keys. In sink hole attack a sensor node will have a lot of false neighbors. Wireless Sensor Network has a dynamic topology, intermittent connectivity, and resource constrained device nodes. Researchers over the past years have encouraged the use of mobile agent to overcome these challenges. The proposed scheme is to defend against sink hole attacks using mobile agents. Mobile agent is a program segment which is self controlling. They navigate from node to node not only transmitting data but also doing computation. They are an effective paradigm for distributed applications, and especially attractive in a dynamic network environment. A routing algorithm with multiple constraints is proposed based on mobile agents. It uses mobile agents to collect information of all mobile sensor nodes to make every node aware of the entire network so that a valid node will not listen the cheating information from malicious or compromised node which leads to sink hole attack. The significant feature of the proposed mechanism is that it does not need any encryption or decryption mechanism to detect the sink hole attack. This mechanism does not require more energy than normal routing protocols like AODV. Here we implement a simulation-based model of our solution to recover from a Sinkhole attack in a Wireless Sensor Network. The mobile agents were developed using the Aglet

[1]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Arkady B. Zaslavsky Mobile agents: can they assist with context awareness? , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[3]  S. Sitharama Iyengar,et al.  Multiresolution data integration using mobile agents in distributed sensor networks , 2001, IEEE Trans. Syst. Man Cybern. Part C.

[4]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Hairong Qi,et al.  Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.

[7]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[8]  Yu-Chee Tseng,et al.  Location Tracking in a Wireless Sensor Network by Mobile Agents and Its Data Fusion Strategies , 2003, Comput. J..

[9]  S. Sitharama Iyengar,et al.  On computing mobile agent routes for data fusion in distributed sensor networks , 2004, IEEE Transactions on Knowledge and Data Engineering.

[10]  Leonidas J. Guibas,et al.  Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.

[11]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[12]  Alan S. Willsky,et al.  Mobile agents in adaptive hierarchical Bayesian networks for global awareness , 1998, SMC'98 Conference Proceedings. 1998 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.98CH36218).