Intrusion Detection Algorithm for Mitigating Sinkhole Attack on Leach Protocol in Wireless Sensor Network: A Case of Iprc-Huye Campus


Authors : UMUHOZA Epiphanie; Dr. Wilson MUSONI

Volume/Issue : Volume 8 - 2023, Issue 10 - October

Google Scholar : https://tinyurl.com/5hd6rxju

Scribd : https://tinyurl.com/4rvxxbw5

DOI : https://doi.org/10.5281/zenodo.10147491

Abstract : Wireless Sensor Network deploys tiny sensor devices to sense physical parameters and transmits periodically to a central station called sink nodes or base station. In several fields nowadays, wireless sensor networks are frequently used, especially in environmental applications, military applications, etc. Since, wireless sensor network is deployed in hostile environment; security forms a major concern for the network. In WSN protocol stack, the network layer poses many security threats. Sinkhole attack is among the serious network layer threat which attracts the entire traffic towards itself and drops or selectively forwards the data packets. This attack will lead to lose many data and performance degradation of the wireless sensor network. Nowadays, sinkhole security attack is still being a problem on the network of sensors. Therefore, this thesis proposes an intrusion detection algorithm for mitigating sinkhole attack on Wireless Sensor Network which uses a clustering-based routing protocol namely LEACH for its routing operation in IPRC-Huye Campus. In the suggested technique, the intrusion ratio (IR), which is determined by the IDS agent using detection metrics like the quantity of packets sent and received was used to detect if there is a sinkhole or not. The calculated numerical or non-numerical value depicts legitimate or unlawful activities. The simulation results demonstrate how the sinkhole node significantly affects network performance by dropping all the packets that it receives from the cluster members. The IDS agent warns the network to halt the data transfer as soon as the sinkhole is detected. Our proposed algorithm checked one network security which is sinkhole attack.As a result, it may be resistant against sinkhole attacks. The simulation results for the recommended algorithm are also shown, and they show that it performs well in comparison to the existing networking without an intrusion detection algorithm in terms of minimal computing both complexity and low energy usage. The approach was also numerically simulated and examined using MATLAB.

Keywords : Intrusion Detection Systems, Joint Request Packet, Hierarchical Wireless Sensor ,Denial Of Service, Intrusion Detection, Network Based Intrusion Detection Systems, Signature Based Intrusion Detection System, Demand Signal Repository, Sinkhole Message Modification nodes.

Wireless Sensor Network deploys tiny sensor devices to sense physical parameters and transmits periodically to a central station called sink nodes or base station. In several fields nowadays, wireless sensor networks are frequently used, especially in environmental applications, military applications, etc. Since, wireless sensor network is deployed in hostile environment; security forms a major concern for the network. In WSN protocol stack, the network layer poses many security threats. Sinkhole attack is among the serious network layer threat which attracts the entire traffic towards itself and drops or selectively forwards the data packets. This attack will lead to lose many data and performance degradation of the wireless sensor network. Nowadays, sinkhole security attack is still being a problem on the network of sensors. Therefore, this thesis proposes an intrusion detection algorithm for mitigating sinkhole attack on Wireless Sensor Network which uses a clustering-based routing protocol namely LEACH for its routing operation in IPRC-Huye Campus. In the suggested technique, the intrusion ratio (IR), which is determined by the IDS agent using detection metrics like the quantity of packets sent and received was used to detect if there is a sinkhole or not. The calculated numerical or non-numerical value depicts legitimate or unlawful activities. The simulation results demonstrate how the sinkhole node significantly affects network performance by dropping all the packets that it receives from the cluster members. The IDS agent warns the network to halt the data transfer as soon as the sinkhole is detected. Our proposed algorithm checked one network security which is sinkhole attack.As a result, it may be resistant against sinkhole attacks. The simulation results for the recommended algorithm are also shown, and they show that it performs well in comparison to the existing networking without an intrusion detection algorithm in terms of minimal computing both complexity and low energy usage. The approach was also numerically simulated and examined using MATLAB.

Keywords : Intrusion Detection Systems, Joint Request Packet, Hierarchical Wireless Sensor ,Denial Of Service, Intrusion Detection, Network Based Intrusion Detection Systems, Signature Based Intrusion Detection System, Demand Signal Repository, Sinkhole Message Modification nodes.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe