Skip to main content

Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks

  • Conference paper
  • First Online:
Next-Generation Networks

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 638))

Abstract

Wireless sensor networks (WSN) are mainly deployed in an unattended and hostile environment. So security is a major concern in these types of networks. Many routing protocols have been designed in WSN, which are responsible for maintaining the routes in the network. We mainly focused on LEACH, the most popular hierarchical routing protocol. But the services of LEACH are threatened by various kinds of attacks such as Black Hole, Selective Forwarding (Gray Hole), Sybil, and HELLO flood attacks. In this paper, firstly we have discussed LEACH and then how it can be compromised by Selective Forwarding Attack. The performance of LEACH without the existence of attack and with the attack has been evaluated in terms of various performance metrics such as packet delivery ratio, packet loss, and remaining energy of the network using Network Simulator (NS-2). We have also emphasized on how to secure the network if they have been threatened to Selective Forwarding Attack. To detect the malicious nodes in the network, we have proposed and implemented a detection strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gill, R.K., Chawla, P., Sachdeva, M.: Wireless Sensor Network: Threat Models and Security Issues

    Google Scholar 

  2. Prathap, U., et al.: Wireless sensor networks applications and routing protocols: survey and research challenges. In: 2012 International Symposium on Cloud and Services Computing (ISCOS). IEEE (2012)

    Google Scholar 

  3. Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer (2011)

    Google Scholar 

  4. The network simulator ns2. www.isi.edu/nsnam/ns

  5. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. IEEE (2000)

    Google Scholar 

  6. Gill, R.K., Chawla, P., Sachdeva, M.: Study of LEACH Routing Protocol for Wireless Sensor Networks

    Google Scholar 

  7. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2), 293–315 (2003)

    Article  Google Scholar 

  8. Tripathi, M., Gaur, M.S., Laxmi, V.: Comparing the impact of black hole and Gray Hole attack on LEACH in WSN. Procedia Comput. Sci. 19, 1101–1107 (2013)

    Google Scholar 

  9. Magotra, S., Kumar, K.: Detection of HELLO flood attack on LEACH protocol. In: 2014 IEEE International on Advance Computing Conference (IACC). IEEE (2014)

    Google Scholar 

  10. Renold, A.P., Poongothai, R., Parthasarathy, R.: Performance analysis of LEACH with Gray Hole attack in wireless sensor networks. In: 2012 International Conference on Computer Communication and Informatics (2012)

    Google Scholar 

  11. Almomani, I., Al-Kasasbeh, B.: Performance analysis of LEACH protocol under denial of service attacks. In: 2015 6th International Conference on Information and Communication Systems (ICICS). IEEE (2015)

    Google Scholar 

Download references

Acknowledgements

Profound gratitude and indebtedness to Dr. Monika Sachdeva, Associate Professor, Shaheed Bhagat Singh State Technical Campus, Ferozepur, for her inspiring intellectual guidance and valuable suggestion throughout the research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priya Chawla .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chawla, P., Sachdeva, M. (2018). Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks. In: Lobiyal, D., Mansotra, V., Singh, U. (eds) Next-Generation Networks. Advances in Intelligent Systems and Computing, vol 638. Springer, Singapore. https://doi.org/10.1007/978-981-10-6005-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6005-2_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6004-5

  • Online ISBN: 978-981-10-6005-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics