Publication Date: 2023/11/17
Abstract: Wireless Sensor Network deploys tiny sensor devices to sense physical parameters and transmits periodically to a central station called sink nodes or base station. In several fields nowadays, wireless sensor networks are frequently used, especially in environmental applications, military applications, etc. Since, wireless sensor network is deployed in hostile environment; security forms a major concern for the network. In WSN protocol stack, the network layer poses many security threats. Sinkhole attack is among the serious network layer threat which attracts the entire traffic towards itself and drops or selectively forwards the data packets. This attack will lead to lose many data and performance degradation of the wireless sensor network. Nowadays, sinkhole security attack is still being a problem on the network of sensors. Therefore, this thesis proposes an intrusion detection algorithm for mitigating sinkhole attack on Wireless Sensor Network which uses a clustering-based routing protocol namely LEACH for its routing operation in IPRC-Huye Campus. In the suggested technique, the intrusion ratio (IR), which is determined by the IDS agent using detection metrics like the quantity of packets sent and received was used to detect if there is a sinkhole or not. The calculated numerical or non-numerical value depicts legitimate or unlawful activities. The simulation results demonstrate how the sinkhole node significantly affects network performance by dropping all the packets that it receives from the cluster members. The IDS agent warns the network to halt the data transfer as soon as the sinkhole is detected. Our proposed algorithm checked one network security which is sinkhole attack.As a result, it may be resistant against sinkhole attacks. The simulation results for the recommended algorithm are also shown, and they show that it performs well in comparison to the existing networking without an intrusion detection algorithm in terms of minimal computing both complexity and low energy usage. The approach was also numerically simulated and examined using MATLAB.
Keywords: Intrusion Detection Systems, Joint Request Packet, Hierarchical Wireless Sensor ,Denial Of Service, Intrusion Detection, Network Based Intrusion Detection Systems, Signature Based Intrusion Detection System, Demand Signal Repository, Sinkhole Message Modification nodes.
DOI: https://doi.org/10.5281/zenodo.10147491
PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT23OCT1515.pdf
REFERENCES