This paper is published in Volume 2, Issue 2, 2017
Area
Wireless Sensor Networks(Computer Network Engineering)
Author
Amulya D
Co-authors
C. N. Chinnaswamy
Org/Univ
The National Institute of Engineering, Mysuru, India
Pub. Date
24 February, 2017
Paper ID
V2I2-1150
Publisher
Keywords
Wireless Sensor Networks (WSN), Sinkhole Attack, Intrusion Detection System (IDS), base station

Citationsacebook

IEEE
Amulya D, C. N. Chinnaswamy. Survey on Mechanisms to Detect and Mitigate the Impact of Sinkhole Attack in Wireless Sensor Networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARnD.com.

APA
Amulya D, C. N. Chinnaswamy (2017). Survey on Mechanisms to Detect and Mitigate the Impact of Sinkhole Attack in Wireless Sensor Networks. International Journal of Advance Research, Ideas and Innovations in Technology, 2(2) www.IJARnD.com.

MLA
Amulya D, C. N. Chinnaswamy. "Survey on Mechanisms to Detect and Mitigate the Impact of Sinkhole Attack in Wireless Sensor Networks." International Journal of Advance Research, Ideas and Innovations in Technology 2.2 (2017). www.IJARnD.com.

Abstract

Sinkhole attack is an active attack, launched in a Wireless Sensor Network by compromising a legitimate node or by introducing a malicious node in order to gain the traffic routed towards it before reaching the base station, by making a false advertisement in the routing information of its nearest distance to reach the base station. Due to this fake information the data packets under transmission are routed towards the malicious node through which the attacker can gain the access to the information, tamper the information or may even destroy it. Thus, this attack causes a severe threat to the normal functionality of the Wireless Sensor Network. Because of the wider range of applicability of Wireless Sensor Networks in our day-to-day life and in future the detection and mitigation of Sinkhole attack plays a vital role. In this view, a survey on the existing mechanisms to detect and mitigate the Sinkhole attack, their advantages and drawbacks is being documented by us in this paper.
Paper PDF