Two-way Authentication Algorithm for Sinkhole Attack Isolation in WSN

Authors : Semagn Shifere; Andebet Dessiewu; Tizazu Bayih

Volume/Issue : Volume 6 - 2021, Issue 1 - January

Google Scholar :

Scribd :

Wireless sensor networks (WSN) are networks that are self-configuring and run without any central coordinator. Security and energy consumption are a big problem for wireless sensor networks because of these network properties. The malicious nodes that join the network cause security attacks.In terms of active and passive attacks, it is possible to distinguish attacks. In the active form of attack, the sinkhole assault. The malicious nodes in the sinkhole attack spoof the base station's identity and behave like the base station. Instead of base stations, the sensor nodes start transmitting data to malicious nodes. Cluster heads are chosen on the basis of energy, distance, to minimize energy consumption of the network LEACH protocol, which divides the entire network into clusters and clusters. Therefore, the total life of the network is decreased and the amount of energy consumed is increased when a sinkhole attack occurs.In this research paper, the latest method is designed to identify and isolate malicious nodes from the network. This algorithm works by using recognition to quickly classify attacks. The proposed algorithm is implemented in NS2 and those parameters are evaluated in terms of performance. As opposed to current techniques, our proposed technique performs well in terms of all parameters.

Keywords : Active, Attack, Sinkhole, Malicious, LEACH, WSN


Paper Submission Last Date
31 - October - 2021

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.