International Journal of Scientific & Technical Development - Volumes & Issues - Volume 9: June 2023, Issue 1

Review paper study on Sinkhole Attacks in Wireless Ad Hoc Networks

Authors

Mandeep Kaur

DOI Number

Keywords

PAPER STUDY, SINKHOLE ATTACKS, WIRELESS AD, HOC NETWORKS

Abstract

The Mobile Ad hoc Network is a modern wireless base communication system is most important and popularly used communication. The Major attack faced by this network is sinkhole attack which can heavily attract the resources available in the network. It has to be prevented to make the energy of the network is available for all resources. Different kinds of attack that can be introduced in wireless network. So security is an essential requirement in mobile ad hoc network (MANETs). There are various type of attacks that can be introduced in wireless network. In this paper we studies sinkhole attack and different routing protocol. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information.

References

[1] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” AdHoc Networks Journal, vol. 1, no. 2-3, pp. 293-315, September 2003..
[2] Drs. Baruch Awerbuch and Amitabh Mishran, Dynamic Source Routing (DSR) Protocol, Advanced Topics in wireless Networks, CS: 647.
[3] Sonal R. Jathe, Dhananjay M. Dakhane, “Indicators for detecting Sinkhole Attack in MANET”, Proc.International Journal of Emerging Technology and Advance Engineering, volume 2, Issue 1, Jan. 2012.
[4] VenkatapathyRagunath , “Implementations of DSR Protocol in NS2 simulator”.
[5] H. C. Tseng, B. J. Culpepper, “Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators”,
[6] Mohammed AshfaqHussain, Dr. A. Francis SaviourDevaraj, Upshot of Sinkhole Attack in DSR Routing Protocol Based MANET, International Journal of Engineering Research and Applications (IJERA) ISSN:2248-9622 www.ijera.com, Vol. 3, Issue 2, March -April 2013, pp.1737-1741 .
[7] A. A. Pirzada and C. McDonald, “Circumventing sinkholes and worm-holes in wireless sensor networks,” in IWWAN ’05: Proceedings of International Workshop on Wireless Ad-hoc Networks, 2005..
[8] Security Architecture for MANET and It’s Application in m Governance,BaljeetKaur, BharatiVidyapeeth Deemed University, Pune. Institute of Management and Entrepreneurship Development.2013 International Conference on Communication Systems and Network Technologies.
[9]G. Giorgetti, S. Mastroianni, J. Lewis, G. Manes, and S. Gupta, “The personal sensor network: A user-centric monitoring solution,” in BodyNets ’07: Proceedings of the 2nd International Conference on Body Area Networks, 2007.
[10] G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, and M. Welsh, “Fidelity and yield in a volcano monitoring sensor network,” in OSDI ’06: Proceedings of the 7th symposium on Operating systems design and implementation. Berkeley, CA, USA: USENIX Association, 2006.
[11] D. Dallas, C. Leckie, and K. Ramamohanarao, “Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks,” in ICON ’07: Proceedings of the 15th IEEE International Conference on Networks, Adelaide, SA, 2007, pp. 176-181

How to cite

Journal

International Journal of Scientific & Technical Development

ISSN

2348-4047

Periodicity

Bi-Annual