2011 International Conference on Recent Trends in Information Technology (ICRTIT) 2011
DOI: 10.1109/icrtit.2011.5972397
|View full text |Cite
|
Sign up to set email alerts
|

A non cryptographic method of sink hole attack detection in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
2

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 10 publications
0
15
0
2
Order By: Relevance
“…In addition to the well-known limitations of systems using signatures and training phases, the IDS based on fuzzy logic and the hybrid one generate a high rate of false positives and false negatives. In [7], the authors present a IDS that employs mobile agents for the detection of sinkhole attacks. Those agents apply a navigation algorithm in which a mobile agent must provide network information when visiting each node in the networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to the well-known limitations of systems using signatures and training phases, the IDS based on fuzzy logic and the hybrid one generate a high rate of false positives and false negatives. In [7], the authors present a IDS that employs mobile agents for the detection of sinkhole attacks. Those agents apply a navigation algorithm in which a mobile agent must provide network information when visiting each node in the networks.…”
Section: Related Workmentioning
confidence: 99%
“…In general, there are many studies that quantify the impact of sinkhole attacks on networks like MANETs, WSNs and VANETs [6], [7]. However, these solutions cause other problems, called adverse effects, on the network , such as high rates of false positives and false negatives, high energy consumption, slow system performance, among others.…”
Section: Introductionmentioning
confidence: 99%
“…The base station uses that value to calculate a VGM (visual geographical map). Later when the EM sends updated RSSI values and the base station identifies a change in packet flow from previous data a sinkhole attack can be detected Sheela, Kumar and Mahadevan proposed a non-cryptographic method using mobile agents to defend against sinkhole attack [14]. The mobile agents create an information matrix of each node by analyzing data transfer.…”
Section: Summary Of Previous Researchmentioning
confidence: 99%
“…Routing protocols used in wireless Ad hoc networks can be classified in two major types. [5,7]. On the other hand, on-demand routing protocols executes the path finding process when a path is required by a node.…”
Section: Effect Of Sinkhole Attack On Routing Protocolsmentioning
confidence: 99%