International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 06 | June 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1022
Hybrid Ant Colony Optimization for Sinkhole Detection in WSN
Madhu Nagaraj
1
, Rampur Srinath
2
1
PG Student, Dept. of Information Science and Engineering, NIE, Mysore, India
2
Associate Professor, Dept. of Information Science and Engineering, NIE, Mysore, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In a Wireless Sensor Network (WSN), grouping is
among the most important tasks, in which one of the hubs
from a group of hubs is chosen to be the group head, as well as
the group head is liable for both standard activities and the
administration of other hubs within the group. Malicious hub
finding is also essential in the wireless sensor network (WSN),
with the purpose of preventing the malicious hub from
becoming the group head. Furthermore, as the malicious hubs
grow, so does the likelihood of becoming a malicious hub as a
bunch head increases. A Hybrid Ant Colony based pernicious
hub location and bunch head choosing approach is presented
to identify harmful hub as well as to choose a relatively high
hub for the center point. The suggested calculation identifies
sinkhole detection for malicious hubs, after which a high-
potential hub is chosen as the bunch head. This approach also
reduces bunch covering with group head geographical
distribution, much as removing spiteful hubs expressly does
not allow malevolent hubs to become bunch heads, resulting in
an overall increase in energy effectiveness.
Key Words: Hybrid Ant Colony, clustering, fuzzy, WSN
1. INTRODUCTION
A wireless sensor network (WSN) is made up of a collection
of sensor hubs that work together in a group to complete a
specific task (for example, environmental variables
management, target follow-up, and so on) and then send the
gathered data to a base station or controller via a distant
medium. WSN is defined as a collection of cooperating hubs
with detecting, reasoning, and remote correspondence
capacities. The sensor hubs combine and transfer data to the
detached base station, from which the end client can obtain
the required information [8]. The sensed data is also
collected 'inside the company' at sink hubs, which may be
sensors or different hubs fortunate to be in potential merely
as assets. The information is then periodically and on-
request delivered to the end customers via the sinks or a
higher request hub the base station [9]. Wireless sensor
networks are used for a variety of purposes, including
common, medical, and environmental services, as well as
military applications. Target tracking in combat, territorial
administration, common work monitoring, environmental
issues oversight, and plant maintenance are only a few
examples of many types of applications. Due to the
functioning of a large number of sensor hubs in inclement
weather, certain nefarious hubs may infiltrate the
organization, causing routine operations to be hampered.
And reduced energy proficiency [13] can also have an impact
on group preparation.
2. SINKHOLE ATTACK
WSNs are vulnerable to a variety of risks, including sinkhole
attacks, which have been regarded as one of the most
significant. A rogue node advertises itself as the best possible
path to the base station in this form of attack, deceiving its
neighbors into using the route more frequently. As a result,
the malicious node has the ability to tamper with data,
disrupt normal operations, and even pose a number of other
threats to the network's security.
Sinkhole assaults can be carried out by one of two sorts of
attackers: malicious insider and resourceful outsiders. In the
first scenario, an adversary uses a compromised node to
start a deception attack by promoting a route to neighbors.
In the latter situation, a laptop-class adversary with high-
performance computing and communication skills
establishes a single-hop route from its surrounding region to
the base-station, persuading the neighbors to send all traffic
through it. Furthermore, the high-quality route draws not
only the sinkhole's neighbors, but practically all nodes that
are closer to the sinkhole than the base-station (perhaps
from several hops away), amplifying the hazard. A sinkhole
attack is depicted in Figure 1(a).
Wormhole attack can also be used to create a sinkhole. In
this form of attack, a malicious node steals a routing packet
from one of its neighbors and sends it to another colluding
node over a secret tunnel. The message is eventually
delivered to the base station by the colluding node. Despite
the fact that the tunnel's two ends are separated by a greater
distance than other routes, it can prevent the source from
identifying other lawful routes that are more than two hops
away from the destination, disrupting network functionality.
An example of such an attack is shown in Figure 1(b).