The Mobile Ad hoc Network is a modern wireless base communication system is most important and popularly used communication. The Major attack faced by this network is sinkhole attack which can heavily attract the resources available in the network. It has to be prevented to make the energy of the network is available for all resources. Different kinds of attack that can be introduced in wireless network. So security is an essential requirement in mobile ad hoc network (MANETs). There are various type of attacks that can be introduced in wireless network. In this paper we studies sinkhole attack and different routing protocol. Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information.
[1] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” AdHoc Networks Journal, vol. 1, no. 2-3, pp. 293-315, September 2003..
[2] Drs. Baruch Awerbuch and Amitabh Mishran, Dynamic Source Routing (DSR) Protocol, Advanced Topics in wireless Networks, CS: 647.
[3] Sonal R. Jathe, Dhananjay M. Dakhane, “Indicators for detecting Sinkhole Attack in MANET”, Proc.International Journal of Emerging Technology and Advance Engineering, volume 2, Issue 1, Jan. 2012.
[4] VenkatapathyRagunath , “Implementations of DSR Protocol in NS2 simulator”.
[5] H. C. Tseng, B. J. Culpepper, “Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators”,
[6] Mohammed AshfaqHussain, Dr. A. Francis SaviourDevaraj, Upshot of Sinkhole Attack in DSR Routing Protocol Based MANET, International Journal of Engineering Research and Applications (IJERA) ISSN:2248-9622 www.ijera.com, Vol. 3, Issue 2, March -April 2013, pp.1737-1741 .
[7] A. A. Pirzada and C. McDonald, “Circumventing sinkholes and worm-holes in wireless sensor networks,” in IWWAN ’05: Proceedings of International Workshop on Wireless Ad-hoc Networks, 2005..
[8] Security Architecture for MANET and It’s Application in m Governance,BaljeetKaur, BharatiVidyapeeth Deemed University, Pune. Institute of Management and Entrepreneurship Development.2013 International Conference on Communication Systems and Network Technologies.
[9]G. Giorgetti, S. Mastroianni, J. Lewis, G. Manes, and S. Gupta, “The personal sensor network: A user-centric monitoring solution,” in BodyNets ’07: Proceedings of the 2nd International Conference on Body Area Networks, 2007.
[10] G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, and M. Welsh, “Fidelity and yield in a volcano monitoring sensor network,” in OSDI ’06: Proceedings of the 7th symposium on Operating systems design and implementation. Berkeley, CA, USA: USENIX Association, 2006.
[11] D. Dallas, C. Leckie, and K. Ramamohanarao, “Hop-count monitoring: Detecting sinkhole attacks in wireless sensor networks,” in ICON ’07: Proceedings of the 15th IEEE International Conference on Networks, Adelaide, SA, 2007, pp. 176-181