Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks

Wireless sensor networks (WSN) are mainly deployed in an unattended and hostile environment. So security is a major concern in these types of networks. Many routing protocols have been designed in WSN, which are responsible for maintaining the routes in the network. We mainly focused on LEACH, the most popular hierarchical routing protocol. But the services of LEACH are threatened by various kinds of attacks such as Black Hole, Selective Forwarding (Gray Hole), Sybil, and HELLO flood attacks. In this paper, firstly we have discussed LEACH and then how it can be compromised by Selective Forwarding Attack. The performance of LEACH without the existence of attack and with the attack has been evaluated in terms of various performance metrics such as packet delivery ratio, packet loss, and remaining energy of the network using Network Simulator (NS-2). We have also emphasized on how to secure the network if they have been threatened to Selective Forwarding Attack. To detect the malicious nodes in the network, we have proposed and implemented a detection strategy.

[1]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[2]  A. P. Renold,et al.  Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Communication and Informatics.

[3]  K. R. Venugopal,et al.  Wireless Sensor Networks Applications and Routing Protocols: Survey and Research Challenges , 2012, 2012 International Symposium on Cloud and Services Computing.

[4]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[5]  Krishan Kumar,et al.  Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[6]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[7]  Iman Almomani,et al.  Performance analysis of LEACH protocol under Denial of Service attacks , 2015, 2015 6th International Conference on Information and Communication Systems (ICICS).

[8]  Vijay Laxmi,et al.  Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN , 2013, ANT/SEIT.