z-logo
open-access-imgOpen Access
Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks
Author(s) -
Fang-Jiao Zhang,
Lidong Zhai,
Jincui Yang,
Xiang Cui
Publication year - 2014
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2014.05.319
Subject(s) - sinkhole , computer science , redundancy (engineering) , wireless sensor network , computer security , wireless , computer network , telecommunications , paleontology , karst , biology , operating system
Wireless sensor networkshas a bright future because of its low-cost, save-power, and easy implementation .etc. However, its security problems have become hot research topics in many applications. Sinkhole attack is just one of frequently encountered security problems, which is easily combined with other attacks to cause more damage. In order to prevent sinkhole attack, we do some research on it, and one way to detect the sinkhole attack based on the redundancy mechanism is proposed in this paper. For the suspicious nodes, messages are sent to them through multi-paths. By evaluating the replied comprehensively, the attacked nodes are finally confirmed. Lastly, a simulation is performed to test the effectiveness of the method. And the simulation shows that the approach could work to some extent

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom