CFP last date
20 January 2025
Reseach Article

Energy Efficient and Reliable Algorithm to Detect and Resolve Sinkhole Attack over Collection Tree Protocol

by Maya Shelke, Kalyani Kadam, Ameya Bhattacharya, Richita Das, Ayushi Rathi, Aishwarya Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 12
Year of Publication: 2016
Authors: Maya Shelke, Kalyani Kadam, Ameya Bhattacharya, Richita Das, Ayushi Rathi, Aishwarya Singh
10.5120/ijca2016911327

Maya Shelke, Kalyani Kadam, Ameya Bhattacharya, Richita Das, Ayushi Rathi, Aishwarya Singh . Energy Efficient and Reliable Algorithm to Detect and Resolve Sinkhole Attack over Collection Tree Protocol. International Journal of Computer Applications. 148, 12 ( Aug 2016), 38-41. DOI=10.5120/ijca2016911327

@article{ 10.5120/ijca2016911327,
author = { Maya Shelke, Kalyani Kadam, Ameya Bhattacharya, Richita Das, Ayushi Rathi, Aishwarya Singh },
title = { Energy Efficient and Reliable Algorithm to Detect and Resolve Sinkhole Attack over Collection Tree Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 12 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 38-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number12/25812-2016911327/ },
doi = { 10.5120/ijca2016911327 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:53:12.753188+05:30
%A Maya Shelke
%A Kalyani Kadam
%A Ameya Bhattacharya
%A Richita Das
%A Ayushi Rathi
%A Aishwarya Singh
%T Energy Efficient and Reliable Algorithm to Detect and Resolve Sinkhole Attack over Collection Tree Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 12
%P 38-41
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs) have gained huge popularity in various new fields. The direct use of each of these sensors individually is to detect its surrounding conditions such as temperature, pressure, sound, motion etc. whereas a collection of such nodes finds application in various large scale management systems such as healthcare, disaster and traffic management programs. In most of these systems, the sensors are located at points which are not physically protected and can hence fall prey to several security threats and attacks very easily. The limited memory, power and capacity of such sensors make it more difficult to introduce advanced, heavy-weight algorithms for securing them against such attacks. Further, the criticality of the applications using WSN makes such security threats more dangerous. In this paper, we show the results of combining a novel detection algorithm with the results of a unique resolution technique of the sinkhole attack when the network is routed using Collection Tree Protocol (CTP).

References
  1. Shishir Sharma and Gajendra Singh Chandel, “A Review of Pairwise of Key Establishment Techniques for Wireless Sensor Networks”, International Journal of Science and Research, 2003.
  2. Government Health Staff, “Internet of Things triggers healthcare security concerns”, Government Health IT, 2015
  3. Jun Shang, et al., “Improvement of approach to detect sinkhole attacks in Wireless Sensor Networks”, Intelligent Computing and Education Technology, pp 695
  4. Omprakash Gnawali, et al., “Collection Tree Protocol”.
  5. Ioannis Krontiris, et al., “Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks”, 2007.
  6. Anthonis Papadimitriou, et al., “Cryptographic Protocols to Fight Sinkhole Attacks on Tree-based Routing in Wireless Sensor Networks”, IEEE, 2009.
  7. Yong Wang, et al., “An Efficient Scheme for Removing Compromised Sensor Nodes from Wireless Sensor Networks”, CSE Technical Reports, 2007.
  8. Qiang Wang, et al., “Reprogramming Wireless Sensor Networks: Challenges and Approaches”, IEEE, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) Collection Tree Protocol (CTP) Sinkhole Attack Base Station (BS) Cluster Head (CH) Sensor Internet of Things (IoT)