NEWS

A MOBILE AGENT-BASED METHOD TO COUNTER SINKHOLE ATTACKS IN WIRELESS SENSOR NETWORKS


(Received: 29-Sep.-2021, Revised: 22-Nov.-2021 , Accepted: 25-Nov.-2021)
Wireless sensor networks (WSNs) are an applied technology widely used in various areas. According to the WSN limitations, they usually face many types of attacks. The sinkhole attack is the most popular and dangerous attack in the routing of WSNs. There are many approaches to counter sinkhole attacks in the literature. The mobile agent methods generate better results in facing sinkhole attacks and overcoming the WSN limitations. In this paper, we present a new mobile agent-based method that applies the trust value of each sensor to detect and prevent sinkhole attacks. We compute the trust values to inform the sensor nodes about their neighbors' reputations. As shown in the experiments, the proposed method generates better results in packet loss ratio. It also fixes the security flaws of previous works and reduces the agents' overhead in the network compared to previous methods.

[1] M. Ali, M. Nadeem, A. Siddique, S. Ahmad and A. Ijaz, "Addressing Sinkhole Attacks in Wireless Sensor Networks: A Review," Int. Journal of Scientific & Technology Research, vol. 9, no. 8, pp. 406-411, 2020.

[2] R. Almesaeed, A. Al-Nasser and H. Al-Junaid, "A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks," International Journal of Electronics and Telecommunications, vol. 67, no. 3, pp. 483-496, 2021.

[3] I. Almomani and K. Sundus, "The Impact of Mobility Models on the Performance of Authentication Services in Wireless Sensor Networks," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 6, no. 1, pp. 75-93, 2020.

[4] S. Aryai and G. S. Binu, "Cross Layer Approach for Detection and Prevention of Sinkhole Attack Using a Mobile Agent," Proc. of the 2nd IEEE International Conference on Communication and Electronics Systems (ICCES), pp. 359-365, DOI: 10.1109/CESYS.2017.8321299, Coimbatore, India, Oct. 2017.

[5] M. Bahekmat, M. H. Yaghmaee, A. S. H. Yazdi and S. Sadeghi, "A Novel Algorithm for Detecting Sinkhole Attacks in WSNs," International Journal of Computer Theory and Engineering, vol. 4, no. 3, pp. 418-421, 2012.

[6] J. A. Chaudhry, U. Tariq, M. A. Amin and R. G. Rittenhouse, "Dealing with Sinkhole Attacks in Wireless Sensor Networks," Advanced Science and Technology Letters, vol. 29 (SecTech 2013), pp. 7-12, 2013.

[7] H. M. A. Fahmy, Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis, 1st Ed., ISBN-13: 978-9811004117, Cairo, Springer, 2016.

[8] G. P. Gupta, M. Misra and K. Garg, "Energy and Trust Aware Mobile Agent Migration Protocol for Data Aggregation in Wireless Sensor Networks," Journal of Network and Computer Applications, vol. 41, pp. 300-311, DOI: 10.1016/j.jnca.2014.01.003, 2014.

[9] S. Hamedheidari and R. Rafeh, "A Novel Agent-based Approach to Detect Sinkhole Attacks in Wireless Sensor Networks," Computers & Security, vol. 37, pp. 1-14, DOI: 10.1016/j.cose.2013.04.002, 2013.

[10] G. Jahandoust and F. Ghassemi, "An Adaptive Sinkhole Aware Algorithm in Wireless Sensor Networks," Ad Hoc Networks, vol. 59, no. C, pp. 24-34, DOI: 10.1016/j.adhoc.2017.01.002, 2017.

[11] A. V. Jatti and V. K. Sonti, "Sinkhole Attack Detection and Prevention Using Agent Based Algorithm," Journal of University of Shanghai for Science and Technology, vol. 23, no. 5, pp. 526-544, 2021.

[12] G. Kalnoor, J. Agarkhed and S. R. Patil, "Agent-based QoS Routing for Intrusion Detection of Sinkhole Attack in Clustered Wireless Sensor Networks," Proc. of the 1st International Conference on Computational Intelligence and Informatics, pp. 571-583, Springer-Singapore, 2017.

[13] S. Kaur and N. Goyal, "A Survey on Security Attacks in Wireless Sensor Networks," International Journal of Advanced Research in Computer Science, vol. 7, no. 6, pp. 94-96, 2016.

[14] G. Kim, Y. Han and S. Kim, "A Cooperative-sinkhole Detection Method for Mobile Ad Hoc Networks," AEU-International Journal of Electronics and Communications, vol. 64, no. 5, pp. 390-397, 2010.

[15] I. Krontiris, T. Giannetsos and T. Dimitriou, "Launching a Sinkhole Attack in Wireless Sensor Networks; the Intruder Side," Proc. of the International Conference on Wireless and Mobile Computing, pp. 526- 531, DOI: 10.1109/WiMob.2008.83, Avignon, France, 2008.

[16] L. Mechtri, F. T. Djemili and S. Ghanemi, "Agent-based Intrusion Detection in Wireless Networks," Implementing Computational Intelligence Techniques for Security Systems Design, pp. 97-130, DOI: 10.4018/978-1-7998-2418-3.ch005, IGI Global, 2020.

[17] O. Naderi, M. Shahedi and S. M. Mazinani, "A Trust Based Routing Protocol for Mitigation of Sinkhole Attacks in Wireless Sensor Networks," International Journal of Information and Education Technology, vol. 5, no. 7, pp. 520-526, 2015.

[18] K. E. Nwankwo and S. M. Abdulhamid "Sinkhole Attack Detection in A Wireless Sensor Networks Using Enhanced Ant Colony Optimization to Improve Detection Rate," Proc. of the 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), pp. 1-6, Zaria, Nigeria, Oct. 2019.

[19] H. Salameh, M. Dhainat and E. Benkhelifa, "A Survey on Wireless Sensor Network-based IoT Designs for Gas Leakage Detection and Fire-fighting Applications," Jordanian Journal of Computers and Information Technology (JJCIT), vol. 5, no. 2, pp. 60-72, 2019.

[20] R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee and Y. J. Song, "Group-based Trust Management Scheme for Clustered Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, 2009.

[21] S. Sharmila and G. Umamaheswari, "Detection of Sinkhole Attack in Wireless Sensor Networks Using Message Digest Algorithms," Proc. of the IEEE International Conference on Process Automation, Control and Computing (PACC), pp. 1-6, Coimbatore, India, DOI: 10.1109/PACC.2011.5978973, 2011.

[22] D. Sheela, K. C. Naveen and G. Mahadevan, "A Non Cryptographic Method of Sink Hole Attack Detection in Wireless Sensor Networks," Proc. of the IEEE Int. Conf. on Recent Trends in Information Technology (ICRTIT), pp. 527-532, DOI: 10.1109/ICRTIT.2011.5972397, Chennai, India, 2011.

[23] G. Thirumalaimuthu, E. E. Lawrence and S. Meenakshi, "Security in Wireless Sensor Networks: Issues and Challenges," International Journal of Computer Application, vol. 6, no. 2, pp. 145-151, 2016.

[24] H. Wang, "A Three-tier Scheme for Sybil Attack Detection in Heterogeneous IWSN," Proc. of the Int. 405 Jordanian Journal of Computers and Information Technology (JJCIT), Vol. 07, No. 04, December 2021. Conf. on Computer Science Communication and Network Security (CSCNS2019), MATEC Web of Conferences, vol. 309, p. 02005, pp. 1-8, EDP Sciences, 2020.

[25] S.-H. Yang, Wireless Sensor Networks - Principles, Design and Applications, ISBN-13: 978- 1447169321, London, Springer, 2014.