International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 9 - Issue 8, August 2020 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Addressing Sinkhole Attacks In Wireless Sensor Networks - A Review

[Full Text]



Mubashir Ali, Muhammad Nadeem, Ayesha Siddique, Shahbaz Ahmad, Amir Ijaz



Wireless Sensor networks, Sinkhole attacks, Wormhole attacks, Blackhole attacks, Sybil attacks, Mitigation Techniques



Wireless Sensor Networks is a cooperative network of number of sensor devices that communicate in a short range to share the sensed information. The sensor networks have got a great attention due to low cost and ad-hoc deployment structure. Thus, wireless sensor networks have become an important interest of research and many researchers have been working on different aspects of wireless sensor networks i.e. routing mechanism, energy efficiency and security etc. Wireless sensor networks are characterized with low resources i.e. low processing power, low communication resources, low memory and are powered by a battery. To utilize these scarce resources well different trade-offs are their when designing the protocols for wireless sensor networks. Security is most crucial issue in wireless sensor networks due to their nature. The low processing and low memory constraints prohibit the deployment of a protocol with security mechanisms in it. Wireless Sensor networks are deployed in vulnerable environment and are open to sinkhole attacks, wormhole attacks, Greyhole attacks etc. Sinkhole attacks are one of the most dangerous attacks where some fake node advertises fake routing update i.e. shortest path to sink node to malfunction network traffic. In this paper, a systematic literature review is conducted to highlight up to date sinkhole attacks along with their prevention techniques in wireless networks. The analysis is based on various parameters of proposed solutions. The paper also discusses the challenges in detecting the sinkhole attacks.



[1] J. Zheng and A. Jamalipour, “Introduction to Wireless Sensor Networks,” in Wireless Sensor Networks, J. Zheng and A. Jamalipour, Eds. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2009, pp. 1–18.
[2] S. M. A. Oteafy and H. S. Hassanein, “Evolution of Wireless Sensor Networks,” in Dynamic Wireless Sensor Networks, Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014, pp. 1–8.
[3] C. Li, “Security of Wireless Sensor Networks: Current Status and Key Issues,” in Smart Wireless Sensor Networks, Y. K. Tan, Ed. InTech, 2010.
[4] J. Sen, “Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses,” in Sustainable Wireless Sensor Networks, Y. K. Tan, Ed. InTech, 2010.
[5] A. Rehman, S. U. Rehman, and H. Raheem, “Sinkhole Attacks in Wireless Sensor Networks: A Survey,” Wireless Personal Communications, vol. 106, no. 4, pp. 2291–2313, Jun. 2019.
[6] S. Gothane, Dr. M. V. Sarode, and Dr. K. S. Raju, “Study of Wireless Sensor Networks its Security Issue, Challenges and Security Management,” in NCCSIGMA-16, 2016, pp. 101–104.
[7] I. Tomic and J. A. McCann, “A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1910–1923, Dec. 2017.
[8] “Security Attacks in Ad Hoc, Sensor and Mesh Networks,” in Security in Wireless Ad Hoc and Sensor Networks, Chichester, UK: John Wiley & Sons, Ltd, 2009, pp. 105–120.
[9] R. R. Malladi and D. A. Govardhan, “Securing Wireless Networks Using Trust Based Adaptive Acknowledgement,” vol. 13, no. 13, p. 6, 2018.
[10] V. K. Singh, “Routing in Wireless Sensor Networks,” in Energy-Efficient Wireless Sensor Networks, 1st ed., V. Sharma and A. Pughat, Eds. CRC Press, 2017, pp. 43–68.
[11] M. E. M. Campista and M. G. Rubinstein, “Sensor Routing,” in Advanced Routing Protocols for Wireless Networks, Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014, pp. 71–92.
[12] “Routing,” in Security in Wireless Ad Hoc and Sensor Networks, Chichester, UK: John Wiley & Sons, Ltd, 2009, pp. 65–79.
[13] J. Chaudhry, U. Tariq, M. Amin, and R. Rittenhouse, “Dealing with Sinkhole Attacks in Wireless Sensor Networks,” (:unav), Nov. 2013.
[14] N. S. Samaras and F. S. Triantari, “On Direct Diffusion Routing for Wireless Sensor Networks,” in 2016 Advances in Wireless and Optical Communications (RTUWO), Riga, Latvia, 2016, pp. 89–94.
[15] ChonBuk National University et al., “Dealing with Sinkhole Attacks in Wireless Sensor Networks,” in Interdisciplinary Research Theory and Technology, 2013, pp. 7–12.
[16] N. J. Patel, “Detection & Prevention Techniques of Sinkhole Attack in Mobile Adhoc Network: A Survey,” p. 5.
[17] S. D. Roy, S. A. Singh, S. Choudhury, and N. C. Debnath, “Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management,” in 2008 IEEE Symposium on Computers and Communications, Marrakech, 2008, pp. 537–542.
[18] A. Mathew and J. S. Terence, “A survey on various detection techniques of sinkhole attacks in WSN,” in 2017 International Conference on Communication and Signal Processing (ICCSP), Chennai, 2017, pp. 1115–1119.
[19] H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, “Detection and mitigation of sinkhole attacks in wireless sensor networks,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644–653, May 2014.
[20] E. C. H. Ngai, J. Liu, and M. R. Lyu, “An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks,” Computer Communications, vol. 30, no. 11–12, pp. 2353–2364, Sep. 2007.
[21] G. Jahandoust and F. Ghassemi, “An adaptive sinkhole aware algorithm in wireless sensor networks,” Ad Hoc Networks, vol. 59, pp. 24–34, May 2017.
[22] Z. Zhang, S. Liu, Y. Bai, and Y. Zheng, “M optimal routes hops strategy: detecting sinkhole attacks in wireless sensor networks,” Cluster Computing, Mar. 2018.
[23] N. Nithiyanandam, D. P. L. Parthiban, and B. Rajalingam, “Effectively Suppress the Attack of Sinkhole in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique,” p. 18.
[24] KLS Gogte Institute of Technology, Department of CSE, Belagavi, Karnataka, India, S. Kori, K. G N, and N. Sidnal, “Distributed Wormhole Attack Mitigation Technique in WSNs,” International Journal of Computer Network and Information Security, vol. 11, no. 5, pp. 20–27, May 2019.
[25] B. Subba, S. Biswas, and S. Karmakar, “A Game Theory Based Multi Layered Intrusion Detection Framework for Wireless Sensor Networks,” International Journal of Wireless Information Networks, vol. 25, no. 4, pp. 399–421, Dec. 2018.
[26] L. Sejaphala, M. Velempini, and S. V. Dlamini, “HCOBASAA: Countermeasure Against Sinkhole Attacks in Software-Defined Wireless Sensor Cognitive Radio Networks,” in 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD), Durban, 2018, pp. 1–5.
[27] M. Jamshidi, S. Sheikh Abooli Poor, N. Nasih Qader, M. Esnaashari, and R. M. Mohammad, “A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents,” IEIE Transactions on Smart Processing & Computing, vol. 8, no. 1, pp. 58–70, Feb. 2019.
[28] K. G. Rana, C. Yongquan, and M. Azeem, “Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach,” p. 9.
[29] V. Gayathri and Y. S. Kumarswamy, “Routing and Neighbor Node Cooperation Scheme to Achieve Energy Efficient Encryption for Integrating Wireless Sensor Networks with Internet,” vol. 14, no. 11, p. 14, 2019.
[30] I. J. Jebadurai, E. B. Rajsingh, and G. J. L. Paulraj, “A Novel Node Collusion Method for Isolating Sinkhole Nodes in Mobile Ad Hoc Cloud,” in Advances in Big Data and Cloud Computing, vol. 645, E. B. Rajsingh, J. Veerasamy, A. H. Alavi, and J. D. Peter, Eds. Singapore: Springer Singapore, 2018, pp. 319–329.
[31] T. T. Vo, N. T. Luong, and D. Hoang, “MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network,” Wireless Networks, May 2018.
[32] F. Shang, D. Zhou, C. Li, H. Ye, and Y. Zhao, “Research on the intrusion detection model based on improved cumulative summation and evidence theory for wireless sensor network,” Photonic Network Communications, vol. 37, no. 2, pp. 212–223, Apr. 2019.
[33] N. T. Luong, T. T. Vo, and D. Hoang, “FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks,” Wireless Communications and Mobile Computing, vol. 2019, pp. 1–17, Jan. 2019.
[34] R. K. Sundararajan and U. Arumugam, “Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks,” Journal of Sensors, vol. 2015, pp. 1–12, 2015.
[35] M. Guerroumi, A. Derhab, and K. Saleem, “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink,” in 2015 12th International Conference on Information Technology - New Generations, Las Vegas, NV, USA, 2015, pp. 307–313.
[36] O. Naderi, M. Shahedi, and S. M. Mazinani, “A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks,” International Journal of Information and Education Technology, vol. 5, no. 7, pp. 520–526, 2015.