Sinkhole vulnerabilities in wireless sensor networks

9Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

Sinkhole attacks in wireless sensor networks occur when a compromised node tries to attract network traffic by advertising un-authorized/illegitimate routing updates. The victim node sends data to the compromised node rather than sending it to the node it was formerly using. Sinkhole attacks are typically used to launch other attacks on the network such as selective forwarding and wormhole attacks. Once the network is compromised it is very hard to predict the kind of attack that is to follow. For this reason, there is a need to strengthen the security of wireless sensor networks. In this paper, we first describe the challenges in detecting sinkhole attacks in wireless sensor networks, followed by an analysis of methods to prevent, detect and neutralize sinkhole attacks. The analysis will be based on discussing the advantages and limitations of the proposed solutions. © 2014 SERSC.

Cite

CITATION STYLE

APA

Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2014). Sinkhole vulnerabilities in wireless sensor networks. International Journal of Security and Its Applications, 8(1), 401–410. https://doi.org/10.14257/ijsia.2014.8.1.37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free