Abstract
Sinkhole attacks in wireless sensor networks occur when a compromised node tries to attract network traffic by advertising un-authorized/illegitimate routing updates. The victim node sends data to the compromised node rather than sending it to the node it was formerly using. Sinkhole attacks are typically used to launch other attacks on the network such as selective forwarding and wormhole attacks. Once the network is compromised it is very hard to predict the kind of attack that is to follow. For this reason, there is a need to strengthen the security of wireless sensor networks. In this paper, we first describe the challenges in detecting sinkhole attacks in wireless sensor networks, followed by an analysis of methods to prevent, detect and neutralize sinkhole attacks. The analysis will be based on discussing the advantages and limitations of the proposed solutions. © 2014 SERSC.
Author supplied keywords
Cite
CITATION STYLE
Chaudhry, J. A., Tariq, U., Amin, M. A., & Rittenhouse, R. G. (2014). Sinkhole vulnerabilities in wireless sensor networks. International Journal of Security and Its Applications, 8(1), 401–410. https://doi.org/10.14257/ijsia.2014.8.1.37
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.