Abstract

The Internet of Things (IoT) makes more heterogeneous devices possible. A wireless sensor network (WSN) is a cluster of sensor nodes used to monitor different field conditions. A node must transport data to its destination, usually the base station (BS), with the assistance of other nodes in the network because each node has a limited wireless transmission range. The primary concern that comes up while data is being transmitted is security. This section will discuss a critical attack known as a sinkhole attack. Using the Leader election technique, this system can monitor the nearby nodes zone-by-zone. The current work uses an Intelligent Intrusion Mechanism (IIM) to identify network intruders and stop sinkhole attacks. Two methods are used to accomplish this: the Zone-Based Leader Election Technique and the Region-Based Leader Election Method. In both methods, a network's nodes are distributed among various zones and regions. The alternative WSN leader is informed of a node's compromised state when detected in the Leader election method. The existing technologies can improve system efficiency and identify intruder nodes. The proposed IIM model achieves a high throughput of 98.2%, energy consumption rate of 80.5%, malicious node detection rate of 96.5%, and end-to-end delay rate of 11.2% compared to other existing models.

Keywords

Internet of Things, Routing Attacks, Intelligent Intrusion Mechanism, Leader Election Method, Wireless Sensor Network,

Downloads

Download data is not yet available.

References

  1. M.Z. Hasan, Z.M. Hanapi, Z.A. Zukarnain, F.H. Huyop, M.D.H. Abdullah, An Efficient Detection of Sinkhole Attacks using Machine Learning: Impact on energy and security. PLOS ONE, 20(3), (2025) e0309532. https://doi.org/10.1371/journal.pone.0309532
  2. S. Pundir, M. Wazid, D.P. Singh, A.K. Das, J.J. Rodrigues, Y. Park, Designing Efficient Sinkhole Attack Detection Mechanism in edge-based IoT deployment. Sensors, 20(5), (2020) 1300. https://doi.org/10.3390/s20051300
  3. L.C. Sejaphala, M. Velempini, The design of a defense mechanism to mitigate sinkhole attack in software defined wireless sensor cognitive radio networks. Wireless Personal Communications, 113(2), (2020) 977–993.
  4. A.A.R.A.C. Omar, B. Soudan, A Comprehensive Survey on Detection of Sinkhole Attack in Routing over Low Power and Lossy Network for Internet of Things. Internet of Things, 22, (2023) 100750. https://doi.org/10.1016/j.iot.2023.100750
  5. S.S.M. Vincent, N. Duraipandian, Detection and Prevention of Sinkhole Attacks in MANETs-based Routing Protocol using Hybrid AdaBoost–Random Forest Algorithm. Expert Systems with Applications, 249, (2024) 123765. https://doi.org/10.1016/j.eswa.2024.123765
  6. A. John, I.F.B. Isnin, S.H.M. Madni, M. Faheem, Intrusion Detection in Cluster-Based Wireless Sensor Networks: Current Issues, Opportunities and Future Research Directions. IET Wireless Sensor Systems, 14(6), (2024) 293–332. https://doi.org/10.1049/wss2.12100
  7. V. Sivagaminathan, M. Sharma, S.K. Henge, Intrusion Detection Systems for Wireless Sensor Networks using Computational Intelligence techniques. Cybersecurity, 6(1), (2023) 27. https://doi.org/10.1186/s42400-023-00161-0
  8. A. Rehman, S.U. Rehman, H. Raheem, Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wireless Personal Communications, 106(4), (2018) 2291–2313. https://doi.org/10.1007/s11277-018-6040-7
  9. A. Bhushan, G. Sahoo, Recent advances in Attacks, Technical Challenges, Vulnerabilities and their Countermeasures in Wireless Sensor Networks. Wireless Personal Communications, 98(2), (2017) 2037–2077. https://doi.org/10.1007/s11277-017-4962-0
  10. S. Padmanabhan, R. Maruthi, R. Anitha, An Experimental Study to Recognize and Mitigate the Malevolent Attack in Wireless Sensor Networks. Global Transitions Proceedings, 3(1), (2022) 55–59. https://doi.org/10.1016/j.gltp.2022.04.013
  11. S. Vadivel, S. Konda, K.R. Balmuri, A. Stateczny, B.D. Parameshachari, Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible light communication network. Electronics, 10(10), (2021) 1176. https://doi.org/10.3390/electronics10101176
  12. W. Jiaan, X. Ancheng, J. Jintao, G. Linyang, Optimization lighting layout of Indoor Visible Light Communication System based on Improved Artificial Fish Swarm Algorithm. Journal of Optics, 22(3), (2020) 035701. https://doi.org/10.1088/2040-8986/ab66cf
  13. M.R.M. R, Localization and detection of sinkhole Attacks in Wireless Sensor Networks based on Denial of Service Attacks. Journal of Electrical Systems, 20(3s), (2024) 195–204. https://doi.org/10.52783/jes.1270
  14. H. Chen, C. Meng, Z. Shan, Z. Fu, B.K. Bhargava, A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by combining Hilbert–Huang Transformation and Trust Evaluation. IEEE Access, 7, (2019) 32853–32866. https://doi.org/10.1109/ACCESS.2019.2903816
  15. W. Fang, M. Xu, C. Zhu, W. Han, W. Zhang, J.J.P.C. Rodrigues, FETMS: Fast and efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access, 7, (2019) 13476–13485. https://doi.org/10.1109/ACCESS.2019.2892712
  16. D. Udaya Suriya Rajkumar, P. Shanmugaraja, K. Arunkumar, R. Sathiyaraj, P. Manivannan, A HSEERP—hierarchical Secured Energy Efficient Routing Protocol for Wireless Sensor Networks. Peer-to-Peer Networking and Applications, 17(1), (2023) 163–175. https://doi.org/10.1007/s12083-023-01575-w
  17. P. Bhale, S. Biswas, S. Nandi, A hybrid IDS for Detection and Mitigation of Sinkhole Attack in 6LoWPAN Networks. International Journal of Information Security, 23(2), (2024) 915–934. https://doi.org/10.1007/s10207-023-00763-2
  18. A.M. Khedr, P.P. Raj, S.S. Rani, Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN. Wireless Personal Communications, 134(1), (2024) 361–382. https://doi.org/10.1007/s11277-024-10913-x
  19. S.S.M. Vincent, Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm. CLEI Electronic Journal, 28(1), (2025) 1–14. https://doi.org/10.19153/cleiej.28.1.7
  20. D. Airehrour, J.A. Gutierrez, S.K. Ray, SecTrust-RPL: A secure trust-aware RPL Routing Protocol for Internet of Things. Future Generation Computer Systems, 93, (2019) 860–876. https://doi.org/10.1016/j.future.2018.03.021
  21. R. Wazirali, R. Ahmad, Machine Learning approaches to detect DoS and their Effect on WSNs lifetime. Computers, Materials & Continua, 70(3), (2021) 4922–4946. https://doi.org/10.32604/cmc.2022.020044
  22. G.A. Sukkar, S. Al-Sharaeh, Enhancing security in wireless sensor networks: A Machine Learning-based DoS Attack Detection. Engineering Technology & Applied Science Research, 15(1), (2025) 19712–19719. https://doi.org/10.48084/etasr.7191
  23. A. Naderloo, S.A.F. Aghda, M. Mirfakhraei, Fuzzy-based Cluster Routing in Wireless Sensor Network. Soft Computing, 27(10), (2023) 6151–6158. https://doi.org/10.1007/s00500-023-07976-6
  24. X. Chai, Y. Wu, L. Feng, Energy-Efficient Scalable Routing Algorithm based on Hierarchical Agglomerative Clustering for Wireless Sensor Networks. Alexandria Engineering Journal, 120, (2025) 95–105.
  25. D.U.S. Rajkumar, P.S. Gavaskar, F. Al-Turjman, R. Sathiyaraj, B. Balusamy, Artificial Bee Colony Method for Identifying Eavesdropper in Terrestrial Cellular Networks. Transactions on Emerging Telecommunications Technologies, 32(7), (2021) e3941.
  26. A. Hamzah, M. Shurman, O. Al-Jarrah, E. Taqieddin, Energy-Efficient Fuzzy-Logic-based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors, 19(3), (2019) 561. https://doi.org/10.3390/s19030561
  27. U.S.R. Dhamodharan, S. Rajendran, R.A. Sundaramoorthy, M. Thirunavukkarasan, A Centralized Mechanism for Preventing DDOs attack in Wireless Sensor Networks. Wireless Personal Communications, 124(2), (2022) 1191–1208.
  28. U.S.D. Rajkumar, R. Vayanaperumal, A leader based Monitoring Approach for Sinkhole Attack in Wireless Sensor Network. Journal of Computer Science, 9(9), (2013) 1106. https://doi.org/10.3844/jcssp.2013.1106.1116
  29. N. Kaja, A. Shaout, D. Ma, an Intelligent Intrusion Detection System. Applied Intelligence, 49(9), (2019) 3235–3247. https://doi.org/10.1007/s10489-019-01436-1