Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks

The work is supported by 'Natural Science Foundation of JiangSu Province of China, No. BK20131137', `Science and Technology Pillar Program (Social development) of Changzhou Science and Technology Bureau, No. CE20135052', 'the Guangdong University of Petrochemical Technology's Internal Project, No. 2012RC0106', 'Jiangsu Province Ordinary University Graduate Innovation Project, No. CXZZ13_02'. Jaime Lloret's work has been partially supported by the 'Ministerio de Ciencia e Innovacion', through the 'Plan Nacional de I+D+i 2008-2011' in the 'Subprograma de Proyectos de Investigacion Fundamental', project TEC2011-27516.

[1]  G. Mahadevan,et al.  A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[2]  G. Umamaheswari,et al.  Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms , 2011, 2011 International Conference on Process Automation, Control and Computing.

[3]  Jaime Lloret,et al.  Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[6]  Reza Rafeh,et al.  A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..

[7]  Faramarz Fekri,et al.  Key pre-distribution in wireless sensor networks using multivariate polynomials , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[8]  P. Dananjayan,et al.  Detection of Sinkhole Attacks for Mobile Nodes in Heterogeneous Sensor Networks with Mobile Sinks , 2010 .

[9]  Chuang Lin,et al.  Security mechanisms Analysis of Wireless Sensor Networks specific Routing attacks , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[10]  K. J. Ray Liu,et al.  Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[11]  Kenneth M. Hopkinson,et al.  Distributed Fault-Tolerant Quality of Wireless Networks , 2011, IEEE Transactions on Mobile Computing.

[12]  Yacine Challal,et al.  Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks , 2011, J. Netw. Comput. Appl..

[13]  Moustafa Youssef,et al.  Secure Localization in Wireless Sensor Networks: A Survey , 2010, ArXiv.

[14]  A. V. Sutagundar,et al.  Location aware event driven multipath routing in Wireless Sensor Networks: Agent based approach , 2013 .

[15]  Nick Antonopoulos,et al.  Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks , 2010, Comput. Commun..

[16]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[17]  Shahriar Mohammadi,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.

[18]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[19]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[20]  Xiuzhen Cheng,et al.  Localized fault-tolerant event boundary detection in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[21]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[22]  Lin Chen,et al.  On Multipath Routing in Multihop Wireless Networks: Security, Performance, and Their Tradeoff , 2009, EURASIP J. Wirel. Commun. Netw..

[23]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[24]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[25]  Ahmad Khonsari,et al.  Detection and mitigation of sinkhole attacks in wireless sensor networks , 2014, J. Comput. Syst. Sci..

[26]  Ruttikorn Varakulsiripunth,et al.  Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.

[27]  Sajal K. Das,et al.  EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.