Mutual Authentication Technique for Isolation of Sinkhole Attack in WSNs

Harjot Kaur
2017 International Journal for Research in Applied Science and Engineering Technology  
The wireless sensor networks (WSN's) is the type of network in which sensor nodes sense the environmental conditions and pass sensed information to the base station. To reduce energy consumption of the network LEACH protocol is applied which divide whole network in clusters and in cluster, cluster heads are selected on the basis of energy, distance. The sinkhole attack is triggered in the network which reduce network performance. The mutual authentication technique is proposed which detect
more » ... ious nodes from the network. The performance of proposed technique is tested in NS2 software in terms of various parameters Keywords: Active, Attack attack, LEACH , Passive attack , Sinkhole, WSN. I. INTRODUCTION Wireless Sensor Network (WSN) is a combination of tiny light weight wireless sensors with computing elements. These sensor nodes are generally cheaper in price, with limited energy storage and limited processing capabilities. Wireless sensor network consist of large number of these sensor nodes (usually hundred or thousand of nodes). These types of networks are highly distributed and deployed in hostile environments [1] . Wireless sensor networks monitor the system or surroundings by measuring physical parameters, for example, moistness, weight and temperature. WSN's are most appropriate for applications like natural life checking, military order, shrewd interchanges, modern quality control, and perception of basic bases, brilliant structures, circulated apply autonomy, movement observing, inspecting human heart rates, and so forth. . The battery present within the nodes of WSN is of smaller size. Also the nodes are located at really far distances where human is not able to reach. So the major concern within the WSNs is the usage of battery within them. This also affects the overall lifetime of the nodes and thus the deployment of the network. More often, than the nodes are consist of a radio transceiver and a microcontroller powered by a battery. As well as a few kind of sensor for detecting light, heat, humidity, temperature, etc. Since there is no immovable topology in these networks, one of the terrible challenges is routing testimony from its source to the destination. Ordinarily these routing protocols draw influence from two fields; WSNs and mobile ad hoc networks (MANETs). WSN routing protocols hand over the required functionality but cannot stem the high frequency of topology changes. Whereas, MANET routing protocols can contract with flexibility in the network but they are designed for two way communication that in sensor networks is often not needed. Protocols designed precisely for WSNs are virtually always multi-hop and consistently adaptations of existent protocols[2] The size of various constraints such as battery size, processors, information storing memory and so on are important within these networks. The consumption of energy is required to be advanced within the networks with the help of various optimization algorithms. Various time constraints are present within the detected and routing information sent across the WSNs. Generally sensor nodes rely on a battery with restricted lifetime, and their replacement is impractical because of physical constraints. Moreover the architecture and protocol of sensor networks must have the capacity to scale up any number of sensor nodes. Since the battery lifetime may be extended on the off chance that one can figure out how to reduce the measure of communication [3] . In the sensing subsystem energy consumption can be reduced by utilizing low power hardware components to the energy efficient routing protocols such as Hybrid Energy-Efficient Distributed (HEED).It is a multi-hop clustering algorithm in wireless sensor network [4] . The clustering includes grouping nodes into clusters and choosing cluster heads periodically such that individuals from a cluster can speak with their cluster heads and these cluster heads send aggregated data received from its individuals to a base station. In every cluster has a cluster head and rest nodes are individual from that cluster. Clustering leads to a two-level order in which cluster heads shape the higher level while part nodes frame the lower level [5] . Since the cluster head regularly transmit data over longer separations, they loose more energy compared to part nodes. The clustering procedure is utilized to minimize the energy consumption. The LEACH is the protocol which is the most efficient protocol for clustering in wireless sensor network. LEACH is divided into rounds where each round consists of two phases, set-up phase and steady phase [6] .In the LEACH protocol the cluster
doi:10.22214/ijraset.2017.8004 fatcat:jg4isrgmejfx5hm5xccvhhsoju