Atinderpal singh, Tejinderdeep Singh


Recently, Wireless sensor networks became a hot research topic among researchers due to their flexibility and independence of network infrastructures, such as base stations. Due to unique characteristics, such as dynamic network topology, limited bandwidth, and limited battery power, routing in WSN is a particularly challenging task compared to a conventional. And it has experienced serious security problems due to their particular characteristics. Wireless communication can endure interferences or malicious interceptions; whereas, multi-hop communication assumes that each node will perform properly its functions to support network services. Further, self-organization increases the complexity of security management operations as access control, node authentication, secure routing and cryptographic key distribution. Network early work in WSN research has mainly focused on developing an efficient routing mechanism in such a highly dynamic and resource-constrained network. At present, several efficient routing protocols have been proposed for WSN. Most of these protocols have assumed a trusted and cooperative environment. However, in the presence of malicious nodes, the networks are vulnerable to various kinds of attacks. AODV protocol gives high performance gain. In WSN, routing attacks are particularly serious. Aims and objectives of this thesis work is to design and implement NN protocol with SINK hole attack and prevent the system for threat using this hybridisation.


WSN, Sink hole attack, AODV routing protocol, Neural Network

Full Text:



Townsend C, Arms S. Wireless sensor networks. MicroStrain, Inc. 2005;20(9):15-21.

Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Computer networks. 2002 Mar 15;38(4):393-422.

Demirkol I, Ersoy C, Alagoz F. MAC protocols for wireless sensor networks: a survey. IEEE Communications Magazine. 2006 Apr;44(4):115-21.

Raghuwanshi S, Mishra A. An approach towards improved energy-efficiency in wireless sensor nets. InRadio and Wireless Conference, 2003. RAWCON'03. Proceedings 2003 Aug 10 (pp. 225-228). IEEE.

Manjula SH, Abhilash CN, Shaila K, Venugopal KR, Patnaik LM. Performance of aodv routing protocol using group and entity mobility models in wireless sensor networks. InProceedings of the International MultiConference of Engineers and Computer Scientists 2008 Mar (Vol. 2, pp. 1212-1217).

Verma VK, Singh S, Pathak NP. Analysis of scalability for AODV routing protocol in wireless sensor networks. Optik-International Journal for Light and Electron Optics. 2014 Jan 31;125(2):748-50.

Kim YD, Moon IY, Cho SJ. A comparison of improved AODV routing protocol based on IEEE 802.11 and IEEE 802.15. 4. Journal of engineering science and technology. 2009 Jun;4(2):132-41.

Nasser N, Chen Y. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Computer Communications. 2007 Sep 10;30(11):2401-12.

Enami N, Moghadam RA, Dadashtabar K, Hoseini M. Neural network based energy efficiency in wireless sensor networks: A survey. International Journal of Computer Science & Engineering Survey. 2010 Aug;1(1):39-53.

Rahman MS, Park Y, Kim KD. Localization of wireless sensor network using artificial neural network. InCommunications and Information Technology, 2009. ISCIT 2009. 9th International Symposium on 2009 Sep 28 (pp. 639-642). IEEE.

He H, Zhu Z, Makinen E. A neural network model to minimize the connected dominating set for self-configuration of wireless sensor networks. IEEE Transactions on Neural Networks. 2009 Jun;20(6):973-82.

Chuang PJ, Jiang YJ. Effective neural network-based node localisation scheme for wireless sensor networks. IET Wireless Sensor Systems. 2014 Feb 21;4(2):97-103.

Ngai EC, Liu J, Lyu MR. On the intruder detection for sinkhole attack in wireless sensor networks. InCommunications, 2006. ICC'06. IEEE International Conference on 2006 Jun (Vol. 8, pp. 3383-3389). IEEE.

Sharmila S, Umamaheswari G. Detection of sinkhole attack in wireless sensor networks using message digest algorithms. InProcess Automation, Control and Computing (PACC), 2011 International Conference on 2011 Jul 20 (pp. 1-6). IEEE.

Zia T, Zomaya A. Security issues in wireless sensor networks. InSystems and Networks Communications, 2006. ICSNC'06. International Conference on 2006 Oct (pp. 40-40). IEEE.


  • There are currently no refbacks.

Creative Commons License 
This work is licensed under a Creative Commons Attribution 3.0 License. 

Copyright © 2016 by Global Publishing Corporation

ISSN: 2394-501X

For any Technical Support contact us at