Abstract
Wireless sensor networks (WSNs) consist of a large number of nodes, communicating sensor readings to the base stations through other nodes. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing attacks. From a security point of view in WSN, data authenticity, confidentiality, Integrity, and availability are the important security goals. It is in common practice that a security protocol used to be created by focusing a particular attack in WSN. Most renowned attacks in WSN are Sybil attack, Denial of Service attack, wormhole attack, selective attack, HELLO Flooding attack, Sinkhole attack etc. This survey focuses on one of the most challenging routing attacks, called Sinkhole attack. A Sinkhole attack is one of the sternest routing attacks because it attracts surrounding nodes with misleading routing path information and performs data forging or selective forwarding of data passing through it. It can cause an energy drain on surrounding nodes resulting in energy holes in WSNs and it can cause inappropriate and potentially dangerous responses based on false measurements. Researchers had presented several ways to detect and identify sinkhole attacks. This survey reviews related work on Sinkhole attack detection, prevention strategies, and attack techniques and also highlights open challenges in dealing with such attacks. Among many discussed techniques, fuzzy logic-based systems are considered to be good in performance in intruder detection system (IDS).
Similar content being viewed by others
References
Hidoussi, F., Toral-Cruz, H., Boubiche, D. E., Lakhtaria, K., Mihovska, A., & Voznak, M. (2015). Centralized IDS based on misuse detection for cluster-based wireless sensors networks. Wireless Personal Communications, 85(1), 207–224.
Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.
Alajmi, N. (2014). Wireless sensor networks attacks and solutions. arXiv preprint arXiv:1407.6290.
Dimitriou, T., & Krontiris, I. (2006). Secure in-network processing in sensor networks. In Y. Xiao (Ed.), Security in sensor networks (pp. 275–290, Chap. 11). Taylor and Francis Group, CRC press.
Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey. Rensselaer Polytechnic Institute, Troy, New York, Technical Report, 05-07.
Lazos, L., & Poovendran, R. (2005). SeRLoc: Robust localization for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(1), 73–100.
Ngai, E. C. H., Liu, J., & Lyu M. R. (2006). On the intruder detection for sinkhole attack in wireless sensor networks. In IEEE international conference on communications, 2006. ICC’06 (Vol. 8, pp. 3383–3389). IEEE.
Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003, twenty-second annual joint conference of the IEEE computer and communications. IEEE Societies (Vol. 3, pp. 1976–1986). IEEE.
Yu, B., & Xiao, B. (2006). Detecting selective forwarding attacks in wireless sensor networks. In 20th international parallel and distributed processing symposium, 2006. IPDPS 2006 (pp. 8). IEEE.
Othman, S. B., Bahattab, A. A., Trad, A., & Youssef, H. (2015). Confidentiality and integrity for data aggregation in WSN using homomorphic encryption. Wireless Personal Communications, 80(2), 867–889.
Gupta, D., Kaur, H., & Kumar, R. (2016). Detection of sink hole attack in wireless sensor network using advanced secure AODV routing protocol. International Journal of Computer Applications, 156(11), 1–5.
Sundararajan, R. K., & Arumugam, U. (2015). Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors, 2015, 203814.
Shafiei, H., Khonsari, A., Derakhshi, H., & Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. Journal of Computer and System Sciences, 80(3), 644–653.
Sharmila, S., & Umamaheswari, G. (2011). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In 2011 international conference on process automation, control and computing (PACC) (pp. 1–6). IEEE.
Sheela, D., Kumar, C. N., & Mahadevan, G. (2011). A non-cryptographic method of sinkhole attack detection in wireless sensor networks. In 2011 international conference on recent trends in information technology (ICRTIT) (pp. 527–532). IEEE.
Chen, C., Song, M., & Hsieh, G. (2010). Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. In 2010 IEEE international conference on wireless communications, networking and information security (WCNIS) (pp. 711–716). IEEE.
Papadimitriou, A., Le Fessant, F., Viana, A. C., & Sengul, C. (2009). Cryptographic protocols to fight sinkhole attacks on tree-based routing in wireless sensor networks. In 5th IEEE workshop on secure network protocols, 2009. NPSec 2009 (pp. 43–48). IEEE.
Choi, B. G., Cho, E. J., Kim, J. H., Hong, C. S., & Kim, J. H. (2009). A sinkhole attack detection mechanism for LQI based mesh routing in WSN. In International conference on information networking, 2009. ICOIN 2009 (pp. 1–5). IEEE.
Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008, October). Launching a sinkhole attack in wireless sensor networks; the intruder side. In IEEE international conference on wireless and mobile computing networking and communications, 2008. WIMOB’08 (pp. 526–531). IEEE.
Coppolino, L., D’Antonio, S., Romano, L., & Spagnuolo, G. (2010). An intrusion detection system for critical information infrastructures using wireless sensor network technologies. In 2010 5th international conference on critical infrastructure (CRIS) (pp. 1–8). IEEE.
Rassam, M. A., Zainal, A., Maarof, M. A., & Al-Shaboti, M. (2012). A sinkhole attack detection scheme in mint route wireless sensor networks. In 2012 international symposium on telecommunication technologies (ISTT) (pp. 71–75). IEEE.
Hamedheidari, S., & Rafeh, R. (2013). A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Computers & Security, 37, 1–14.
Jahandoust, G., & Ghassemi, F. (2017). An adaptive sinkhole aware algorithm in wireless sensor networks. Ad Hoc Networks, 59, 24–34.
Kibirige, G. W., & Sanga, C. (2015). A survey on detection of sinkhole attack in wireless sensor network. arXiv preprint arXiv:1505.01941.
Devibala, K., BalaMurali, D. S., Ayyasamy, D. A., & Archana, D. M. (2017). Flow-based mitigation model for sinkhole attack in wireless sensor networks using time-variant snapshot. International Journal of Advances in Computer and Electronics Engineering, 2(05), 14–21.
Ahmed, N., Kanhere, S. S., & Jha, S. (2005). The holes problem in wireless sensor networks: A survey. ACM SIGMOBILE Mobile Computing and Communications Review, 9(2), 4–18.
Huang, C. F., & Tseng, Y. C. (2005). The coverage problem in a wireless sensor network. Mobile Networks and Applications, 10(4), 519–528.
Ma, W., Yan, F., Zuo, X., Ren, L., Xia, W., & Shen, L. (2017). Coverage hole detection algorithm without location information in wireless sensor networks. In 2017 3rd IEEE international conference on computer and communications (ICCC) (pp. 357–361). IEEE.
Wood, A. D., Stankovic, J. A., & Son, S. H. (2003). JAM: A jammed-area mapping service for sensor networks. In 24th IEEE real-time systems symposium, 2003. RTSS 2003 (pp. 286–297). IEEE.
Karmakar, S., & Roy, A. (2014). Holes detection in wireless sensor networks: A survey. International Journal of Modern Education and Computer Science, 6(4), 24.
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2–3), 293–315.
Chaturvedi, P., & Daniel, A. K. (2014). Recovery of holes problem in wireless sensor networks. In 2014 international conference on information communication and embedded systems (ICICES) (pp. 1–6). IEEE.
Mohemed, R. E., Saleh, A. I., Abdelrazzak, M., & Samra, A. S. (2017). Energy-efficient routing protocols for solving energy hole problem in wireless sensor networks. Computer Networks, 114, 51–66.
Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve the security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505–1511.
Oriyano, S. P. (2016). Denial of service. CEH™ v9: Certified ethical hacker version 9 study guide (pp. 305–329). New York: Wiley.
Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP + : Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528.
Krontiris, I., Dimitriou, T., Giannetsos, T., & Mpasoukos, M. (2007). Intrusion detection of sinkhole attacks in wireless sensor networks. In International symposium on algorithms and experiments for sensor systems, wireless networks and distributed robotics (pp. 150–161). Springer, Berlin, Heidelberg.
Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., & Bowen, T. (2005). A general cooperative intrusion detection architecture for MANETs. In Proceedings of the third IEEE international workshop on information assurance, 2005 (pp. 57–70). IEEE.
Vuppala, S., Banerjee, A., Pal, A., & Choudhury, P. (2011). An attack identification scheme using hierarchical data clustering in MANET. In International conference on computer engineering and technology, 3rd (ICCET 2011). ASME Press.
Abraham, A., Grosan, C., & Martin-Vide, C. (2007). Evolutionary design of intrusion detection programs. IJ Network Security, 4(3), 328–339.
Sun, B., Wu, K., & Pooch, U. W. (2003). Zone-based intrusion detection for mobile ad hoc networks. International Journal of Ad Hoc and Sensor Wireless Networks, 2(3), 2003–2009.
Banerjee, S., Grosan, C., & Abraham, A. (2005). IDEAS: intrusion detection based on emotional ants for sensors. In Proceedings of the 5th international conference on intelligent systems design and applications, 2005. ISDA’05 (pp. 344–349). IEEE.
Patcha, A., & Park, J. M. (2006). A game theoretic formulation for intrusion detection in mobile Ad Hoc networks. IJ Network Security, 2(2), 131–137.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 255–265). ACM.
Mukkamala, S., Sung, A. H., & Abraham, A. (2005). Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications, 28(2), 167–182.
Li, Y., & Parker, L. E. (2008). Intruder detection using a wireless sensor network with an intelligent mobile robot response. In Southeastcon, 2008. IEEE (pp. 37–42). IEEE.
Soni, V., Modi, P., & Chaudhri, V. (2013). Detecting sinkhole attack in a wireless sensor network. International Journal of Application or Innovation in Engineering & Management, 2(2), 29–32.
Diallo, C., Sawaré, A., & Sow, M. T. (2017). Security issues and solutions in wireless sensor networks. International Journal of Computer Science and Information Security, 15(3), 6.
Kaur, M., & Singh, A. (2016, September). Detection and Mitigation of Sinkhole Attack in Wireless Sensor Network. In 2016 International conference on micro-electronics and telecommunication engineering (ICMETE) (pp. 217–221). IEEE.
Sharma, P., & Singh, A. (2017). Probing and removal of denial of service attack in wireless sensor networks. Imperial Journal of Interdisciplinary Research, 3(2), 975–978.
Dalal, S., & Devi, S. (2016). Survey on attacks pertaining to wireless mesh networks and approach towards counter measures. International Journal of Computer Applications, 149(12), 20–26.
Singh, A., & Singh, T. (2016). Review on detection and prevention of sink hole attack in network. Global Journal of Computers & Technology, 5(2), 289–292.
Deng, J., Han, R., & Mishra, S. (2006). INSENS: Intrusion-tolerant routing for wireless sensor networks. Computer Communications, 29(2), 216–230.
Misra, S., Bhattarai, K., & Xue, G. (2011, June). BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. In 2011 IEEE international conference on communications (ICC) (pp. 1–5). IEEE.
Sen, J. (2010). A survey on wireless sensor network security. arXiv preprint arXiv:1011.1529.
Roy, S. D., Singh, S. A., Choudhury, S., & Debnath, N. C. (2008). Countering sinkhole and black hole attacks on sensor networks using dynamic trust management. In IEEE symposium on computers and communications, 2008. ISCC 2008 (pp. 537–542). IEEE.
Kalnoor, G., Agarkhed, J., & Patil, S. R. (2017). Agent-based QoS routing for intrusion detection of sinkhole attack in clustered wireless sensor networks. In Proceedings of the first international conference on computational intelligence and informatics (pp. 571–583). Springer, Singapore.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rehman, Au., Rehman, S.U. & Raheem, H. Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wireless Pers Commun 106, 2291–2313 (2019). https://doi.org/10.1007/s11277-018-6040-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-018-6040-7