Wireless Sensor Network deploys tiny sensor
devices to sense physical parameters and transmits
periodically to a central station called sink nodes or base
station. In several fields nowadays, wireless sensor
networks are frequently used, especially in environmental
applications, military applications, etc. Since, wireless
sensor network is deployed in hostile environment;
security forms a major concern for the network. In WSN
protocol stack, the network layer poses many security
threats. Sinkhole attack is among the serious network
layer threat which attracts the entire traffic towards itself
and drops or selectively forwards the data packets. This
attack will lead to lose many data and performance
degradation of the wireless sensor network. Nowadays,
sinkhole security attack is still being a problem on the
network of sensors. Therefore, this thesis proposes an
intrusion detection algorithm for mitigating sinkhole
attack on Wireless Sensor Network which uses a
clustering-based routing protocol namely LEACH for its
routing operation in IPRC-Huye Campus. In the
suggested technique, the intrusion ratio (IR), which is
determined by the IDS agent using detection metrics like
the quantity of packets sent and received was used to
detect if there is a sinkhole or not. The calculated
numerical or non-numerical value depicts legitimate or
unlawful activities. The simulation results demonstrate
how the sinkhole node significantly affects network
performance by dropping all the packets that it receives
from the cluster members. The IDS agent warns the
network to halt the data transfer as soon as the sinkhole is
detected. Our proposed algorithm checked one network
security which is sinkhole attack.As a result, it may be
resistant against sinkhole attacks. The simulation results
for the recommended algorithm are also shown, and they
show that it performs well in comparison to the existing
networking without an intrusion detection algorithm in
terms of minimal computing both complexity and low
energy usage. The approach was also numerically
simulated and examined using MATLAB.
Keywords : Intrusion Detection Systems, Joint Request Packet, Hierarchical Wireless Sensor ,Denial Of Service, Intrusion Detection, Network Based Intrusion Detection Systems, Signature Based Intrusion Detection System, Demand Signal Repository, Sinkhole Message Modification nodes.