Download Now Free registration required
One of the reasons that the research of intrusion detection in wireless sensor networks has not advanced significantly is that the concept of "Intrusion" is not clear in these networks. In this paper, the authors investigate in depth one of the most severe attacks against sensor networks, namely the sinkhole attack, and they emphasize on strategies that an attacker can follow to successfully launch such an attack. Then, they propose specific detection rules that can make legitimate nodes become aware of the threat, while the attack is still taking place. Finally, they demonstrate the attack and present some implementation details that emphasize the little effort that an attacker would need to put in order to break into a realistic sensor network.
- Format: PDF
- Size: 130.69 KB