Karthigadevi, et.al (2019) suggested an innovative decentralized framework that utilized the NDET algorithm to detect and prevent sinkhole assault [10]. Every node deployed this method to maintain the neighbour table for storing the neighbourhood details. Every node was responsible for gathering the details regarding the neighbour. This method assisted in estimating the network density and recognizing the malevolent node in the area. The distribution of information related to recognized malevolent nodes was done to the neighbouring nodes for avoiding the malicious node at subsequent transmissions. The suggested framework was applicable for mitigating the overhead and maximizing the throughput when the best-effort traffic was maximized.
S. Padmanabhan, et.al (2022) investigated RSR (Reliable Self Reconfiguration) technique for removing the malicious sinkhole assault from the network [11]. The primary stage was executed for detecting the malevolent node. The next stage employed RM (reconfiguration mechanism) to correct it without considering resource loss. A C++-based simulator was applied to simulate RM to fix the sinkhole assault. This technique was computed based on diverse components namely PDR (Packet Delivery Ratio) and energy utilization. The experimental outcomes revealed the superiority of the investigated technique over the traditional methods to discover and remove the sinkhole attack.
N. Al-Maslamani, et.al (2020) focused on constructing and implementing the method to detect sinkhole intrusion with the deployment of the SIO model [12]. In this method, a WE (weight estimation) method was integrated with the ABCO framework to improve the accuracy while detecting the sinkhole assault. MATLAB was executed for quantifying the constructed method concerning accuracy, detection time, convergence speed, overhead, and power usage. The simulation results reported the effectiveness and robustness of the constructed method against the sinkhole assault and offered superior precision.
A. A. Jasim, et.al (2019) designed a protocol known as SEEDA to detect sinkhole attacks [13]. This protocol produced a random value and random timestamp via a secret key for making the network more authentic. The sink aimed to determine the false aggregated data after receiving the packets based on the produced key in advance. An SNA algorithm, DFA, FHE, and AC algorithms were deployed for detecting and preventing the attacks. The initial algorithm helped in preventing the assaults from achieving access to the network. The simulation results reported that this approach offered an accuracy of 98.84% for detecting malevolent nodes, an energy usage of 3.04 joules, a maximum delay of up to 0.038 secs, and a resistance time of up to 0.054.
N. D. L, et.al (2019) introduced a novel secure routing protocol based on trust systems for WSNs [14]. First of all, this algorithm was utilized to generate the SNs (sensor nodes) as clusters. After that, a secure path was developed using a TE (trust evaluation) technique for every SN at CH (Cluster Head) to transmit the data from SN to sink. The trust was computed at CH according to social trust and data trust. Diverse parameters namely duration of the network, and MDR (Malicious Detection Rate) employed to evaluate the introduced algorithm in experimentation. The outcomes validated the applicability of the presented algorithm in contrast to the existing methods during the maximization of the malevolent behaviour of the network.
A. K. Sangaiah, et.al (2022) discussed that the routing assaults such as sinkholes resulted in directing the network data to malevolent users and disrupting the network device [15]. Thus, a novel protocol was established based on CL-MLSP with AODV. The data was encrypted and decrypted using AES (Advanced Encryption Standard) algorithm. A clustering technique was deployed based on power, mobility, and distribution for every node to acquire the shorter route. The established protocol was computed in NS2 (Network Simulator 2) concerning the duration of the network, latency, PLL (packet loss), and security. The outcomes revealed that the established protocol mitigated the energy consumption by up to 6.54%, a drop rate of 12.87%, and delay, and maximized the throughput by 8.12%, and security by up to 9.46%.
D. Kumar, et.al (2022) described that the military areas made the deployment of WSN (Wireless Sensor Network) for monitoring the activities of inconsistent sides [16]. The malicious nodes had the potential for joining the system and activating the security intrusions. Then, SNs (sensor nodes) were employed to initialize the process to transmit the information to the malevolent node rather than BS. A new algorithm was suggested for discovering and segregating malicious nodes from the network. The suggested approach was computed on NS2 concerning diverse parameters. The results demonstrated the adaptability of the suggested algorithm in comparison with the traditional methods for detecting the sinkhole attack.
K. E. Nwankwo, et.al (2019) discussed that the sinkhole assault was launched in WSN when the malicious node pretended as the authentic node nearer to the sink for transmitting the data, and modifying, dropping or delaying the data [17]. Thus, a sinkhole detection system called ACO (Ant Colony Optimization) was presented and employed for detecting the sinkhole more effectively concerning packet drop, PDR, energy exchange and throughput in WSN. An analysis was conducted on the presented approach. The outcomes revealed that the presented approach was capable of enhancing the accuracy to detect the sinkhole attack and mitigating FAR (False Alarm Rate) in WSN. B. M. Devaraju, et.al (2018) analyzed that the sensor nodes had susceptibility to failure due to their implementation in open regions, and tampering by intruders [18]. Malicious assaults such as DoS (Denial of Service), Sinkhole attacks, etc. aimed to modify the complex information which led to degraded the efficacy. Therefore, a CLMPI technique was projected for detecting and preventing the malevolent activities in WSN. The results depicted that the projected method was effective to alleviate the processing delay and communicating delay after avoiding the malevolent activities in networks.
Table 1
Author Name | Year | Findings |
---|
Karthigadevi, et.al | 2019 | The suggested model assisted in estimating the network density and recognizing the occurrence of the malicious node in the area. Moreover, this model led to mitigating the overhead to collect the snapshots and routes. |
A. A. Jasim, et.al | 2019 | Designed a protocol known as SEEDA to detect sinkhole attacks. |
N. D. L, et.al | 2019 | Introduced novel secure routing protocols based on a trust system for WSNs. First of all, this algorithm was utilized to generate the SNs (sensor nodes) as clusters. |
K. E. Nwankwo, et.al | 2019 | The primary outcomes as well as further insights were described. The EACO algorithm was deployed further on NS-3.29 in WSN. |
N. Al-Maslamani, et.al | 2020 | The outcomes demonstrated the efficiency and robustness of the projected technique to detect the sinkhole attack at a superior detection accuracy rate. |
D. Kumar, et.al | 2022 | Described the military areas that made the deployment of WSN (Wireless Sensor Network) for monitoring the activities of inconsistent sides. |
A. K. Sangaiah, et.al | 2022 | Discussed that the routing assaults such as sinkholes resulted in directing the network data to the malevolent user and disrupting the network device. |
S. Padmanabhan, et.al | 2022 | Investigated RSR (Reliable Self Reconfiguration) technique for removing the malicious sinkhole assault from the network. |