Research Article

WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks

Algorithm 4

Model of Scheduling attack.
N Network Size
SN Sensor Node
MN  Malicious Node
CH Cluster Head
BS Base Station
CM Cluster Member
NC Cluster Heads list
x Integer value between 0 and 
, compute 
IF THEN
  
ELSE
    
ENDIF
, NC
CH broadcasts the advertisement message (ADV_CH)
x CMs will join CH
IF CH = MN THEN
  CH performs the attack by creating the TDMA schedule and give all nodes
  same time slot to send data
ELSE
  CH creates normal TDMA schedule
ENDIF
x CMs send data to CH in the corresponding TDMA time slot
CH sends aggregated data to BS