Research Article

WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

Algorithm 2

Model of Grayhole attack.
N Network Size
SN Sensor Node
MN Malicious Node
CH Cluster Head
BS Base Station
CM Cluster Member
NC Cluster Heads list
x Integer value between 0 and
, compute 
IF THEN
  
ELSE
  
ENDIF
, NC
CH broadcasts the advertisement message (ADV_CH)
x CMs will join CH
  CH creates TDMA schedule
  x CMs send data to CH in the corresponding TDMA time slot
IF CH = MN THEN
  Performs the attack by dropping some packets (randomly or selectively)
ELSE
  Sends aggregated data to BS
ENDIF