Research Article
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
Algorithm 1
Model of Blackhole attack.
N Network Size | SN Sensor Node | MN Malicious Node | CH Cluster Head | BS Base Station | CM Cluster Member | NC Cluster Heads list | x Integer value between 0 and | , compute | IF THEN | | ELSE | | ENDIF | , NC | | CH broadcasts the advertisement message (ADV_CH) | x CMs will join CH | CH creates TDMA schedule | x CMs send data to CH in the corresponding TDMA time slot | | IF CH = MN THEN | Performs the attack by dropping all packets | ELSE | Sends aggregated data to BS | ENDIF |
|