2017
DOI: 10.17485/ijst/2017/v10i12/90904
|View full text |Cite
|
Sign up to set email alerts
|

Sinkhole Attack in Wireless Sensor Networks-Performance Analysis and Detection Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…But, specific attack types cannot be identified from the performance metrics of a network. Baskar et al [12] simulated and analyzed the network performance under the sinkhole attack in WSN in terms of energy consumption, throughput, and packet delivery ratio. The authors concluded that in a network with a large number of network nodes and few attacker nodes, attack impact was less.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…But, specific attack types cannot be identified from the performance metrics of a network. Baskar et al [12] simulated and analyzed the network performance under the sinkhole attack in WSN in terms of energy consumption, throughput, and packet delivery ratio. The authors concluded that in a network with a large number of network nodes and few attacker nodes, attack impact was less.…”
Section: Related Workmentioning
confidence: 99%
“…Sinkhole Attack: The Sinkhole attack [12], [20] is implemented as an extension to the Black hole attack. This attack node forces the destination node to send the RREP message through it.…”
Section: )mentioning
confidence: 99%
“…Lastly, Baskar et al [10] used an NS-2 simulator to simulate a sinkhole attack on a tree-based routing protocol that is described in their paper. The researchers used energy consumption, throughput and a packet delivery ratio as matrices to measure the impact of sinkhole attacks in different attack scenarios that varied in network size, number of malicious nodes, location of malicious nodes and power of malicious nodes.…”
Section: Literature Reviewmentioning
confidence: 99%
“…These include packet delivery ratio (PDR), energy consumption (EC), network lifetime (LT), throughput and packet delay. It is, however, advisable to look at all these matrices when an attack impact analysis is being conducted, as looking at the results of [10] and [8], there is a contrast in their results that could be due to the different impact matrices used in the studies. In [10], the researchers stated that the significance of the sinkhole attack increased when the malicious node moved closer to the base station, whereas in [8], the researchers stated that the sinkhole attack had a significant impact on the network regardless of the location of the malicious node.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Black hole attack often targets hierarchical architectures and more specifically aggregator nodes. Multiple paths routing presents a defense against black hole attack [61] [62].…”
Section: The Most Known Attacksmentioning
confidence: 99%