Sinkhole attacks in wireless sensor networks: A survey

A Rehman, SU Rehman, H Raheem - Wireless Personal Communications, 2019 - Springer
… is considered to be the most dangerous attack in WSN as in this attackSinkhole attack
can also be used to launch other attacks and send false information to the base station

A survey on detection of sinkhole attack in wireless sensor network

GW Kibirige, C Sanga - arXiv preprint arXiv:1505.01941, 2015 - arxiv.org
… The adversary normally compromises the node and that node will be used to launch an attack.
… before reach to base station. [22]. Sinkhole attack prevents base station from acquiring a …

[HTML][HTML] Detection and mitigation of sinkhole attacks in wireless sensor networks

H Shafiei, A Khonsari, H Derakhshi… - Journal of computer and …, 2014 - Elsevier
… We introduce a centralized model to detect sinkhole attacks based on the hazard model. …
We introduce a centralized model to detect sinkhole attacks based on the proposed hazard …

[HTML][HTML] Detecting sinkhole attacks in IoT-based wireless sensor networks using distance from base station

K Mondal, SS Yadav, V Pal, AP Singh… - International Journal of …, 2022 - igi-global.com
… as well as should be competent enough to handle attacks. Intrusion detection system (IDS)
is … against sinkhole attack using the Euclidean distance of each node from base station. The …

Detecting Sinkhole attacks in wireless sensor networks

C Tumrongwittayapak, R Varakulsiripunth - 2009 ICCAS-SICE, 2009 - ieeexplore.ieee.org
… for detecting the Sinkhole attack based on Received … Base Station (BS) is located at origin
position (0,0). We use this information as weight from the BS in order to detect Sinkhole attack. …

[PDF][PDF] Dealing with sinkhole attacks in wireless sensor networks

JA Chaudhry, U Tariq, MA Amin… - Advanced Science and …, 2013 - academia.edu
… only those close to the base station. We consider two scenarios of sinkhole attacks. In the first
the … In both cases the intruder claims to have the shortest path to base station so that it can …

[PDF][PDF] Addressing Sinkhole Attacks in Wireless Sensor Networks—A Review

M Ali, M Nadeem, A Siddique, S Ahmad… - Int. J. Sci. Technol …, 2020 - researchgate.net
… toward the base station leaving it open to the sinkhole attacks. A sinkhole attacks starts when
a … only traps the nodes closer to the base station rather than all nodes which make attackers …

On the intruder detection for sinkhole attack in wireless sensor networks

ECH Ngai, J Liu, MR Lyu - 2006 IEEE international conference …, 2006 - ieeexplore.ieee.org
… The focus of our work is to effectively identify the real intruder (SH) in the sinkhole attack in
presence of colluding nodes. We assume that the base station is physically protected or has …

Detecting sinkhole attack and selective forwarding attack in wireless sensor networks

C Tumrongwittayapak… - 2009 7th International …, 2009 - ieeexplore.ieee.org
… be designed to detect the attacks. Further, these techniques … the Sinkhole attack and the
Selective Forwarding attack … of all sensor nodes which the Base Station (BS) is origin position (0,…

[HTML][HTML] The design of a defense mechanism to mitigate sinkhole attack in software defined wireless sensor cognitive radio networks

LC Sejaphala, M Velempini - Wireless Personal Communications, 2020 - Springer
… or base station. This study proposes a scheme designed to address the effects of the sink hole
attack … The sinkhole attack prevents the sink node or base station from receiving observed …