Abstract
Wireless sensor networks (WSN) are mainly deployed in an unattended and hostile environment. So security is a major concern in these types of networks. Many routing protocols have been designed in WSN, which are responsible for maintaining the routes in the network. We mainly focused on LEACH, the most popular hierarchical routing protocol. But the services of LEACH are threatened by various kinds of attacks such as Black Hole, Selective Forwarding (Gray Hole), Sybil, and HELLO flood attacks. In this paper, firstly we have discussed LEACH and then how it can be compromised by Selective Forwarding Attack. The performance of LEACH without the existence of attack and with the attack has been evaluated in terms of various performance metrics such as packet delivery ratio, packet loss, and remaining energy of the network using Network Simulator (NS-2). We have also emphasized on how to secure the network if they have been threatened to Selective Forwarding Attack. To detect the malicious nodes in the network, we have proposed and implemented a detection strategy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gill, R.K., Chawla, P., Sachdeva, M.: Wireless Sensor Network: Threat Models and Security Issues
Prathap, U., et al.: Wireless sensor networks applications and routing protocols: survey and research challenges. In: 2012 International Symposium on Cloud and Services Computing (ISCOS). IEEE (2012)
Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer (2011)
The network simulator ns2. www.isi.edu/nsnam/ns
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. IEEE (2000)
Gill, R.K., Chawla, P., Sachdeva, M.: Study of LEACH Routing Protocol for Wireless Sensor Networks
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2), 293–315 (2003)
Tripathi, M., Gaur, M.S., Laxmi, V.: Comparing the impact of black hole and Gray Hole attack on LEACH in WSN. Procedia Comput. Sci. 19, 1101–1107 (2013)
Magotra, S., Kumar, K.: Detection of HELLO flood attack on LEACH protocol. In: 2014 IEEE International on Advance Computing Conference (IACC). IEEE (2014)
Renold, A.P., Poongothai, R., Parthasarathy, R.: Performance analysis of LEACH with Gray Hole attack in wireless sensor networks. In: 2012 International Conference on Computer Communication and Informatics (2012)
Almomani, I., Al-Kasasbeh, B.: Performance analysis of LEACH protocol under denial of service attacks. In: 2015 6th International Conference on Information and Communication Systems (ICICS). IEEE (2015)
Acknowledgements
Profound gratitude and indebtedness to Dr. Monika Sachdeva, Associate Professor, Shaheed Bhagat Singh State Technical Campus, Ferozepur, for her inspiring intellectual guidance and valuable suggestion throughout the research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chawla, P., Sachdeva, M. (2018). Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks. In: Lobiyal, D., Mansotra, V., Singh, U. (eds) Next-Generation Networks. Advances in Intelligent Systems and Computing, vol 638. Springer, Singapore. https://doi.org/10.1007/978-981-10-6005-2_41
Download citation
DOI: https://doi.org/10.1007/978-981-10-6005-2_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6004-5
Online ISBN: 978-981-10-6005-2
eBook Packages: EngineeringEngineering (R0)