BLACK HOLE Attack: A New Detection Technique
Keywords:
WSN, Black-hole attacks, multiple base stations & Check agentAbstract
Due to the wireless nature and infrastructure-less environment of WSN, they are more vulnerable to many types of security attacks. This paper proposes a technique to detect the black-hole attack using multiple base-stations and a check agent based technology. This technique is Energy efficient, Fast, Lightweight and Reduces message complexity. An effective solution is proposed that uses multiple base stations to improve the delivery of the packets from the sensor nodes reaching at least one base station in the network, thus ensuring high packet delivery success. The proposed technique is more efficient than the previous techniques and gives better results. Check agent is a software program which is self-controlling and monitoring, smart homes, structures, target it moves from node to node and checks wireless nodes envelop embedded electronic sensors along with battery and RF devices. The purpose of these sensors is to sense and recognize diverse biological parameters, for instance, temperature, pressure, air pollution etc., to communicate with the neighboring nodes and compute the gathered data. Their application space is huge as they can be deployed in various fields like agriculture the presence tracking, health care, and military surveillance and of black-hole nodes in the network. Routing through multiple base stations algorithm is only activated when there is a chance of black-hole attack on the network. This method prevents the black hole attack imposed by both single and multiple black hole nodes. The tool used to implement the proposed algorithm is NS2, which is an object oriented event drive software package. The result of the simulation study expected to get good network performance by minimizing the packet losses as well as effectively prevent the black hole attack against wireless sensor networks. A solution to avoid the black hole attack has been proposed. The solution will be implemented in NS-2.
References
Sanjeev Gangwar “Mobile Ad Hoc Network Routing Protocols: a Detailed Performance Examination of AODV, DSR and DSDV” , International Journal of Computer Applications , Volume 49– No.9, July 2012.
Simanta Sarma, Binita Devi ,” Security Attacks on Routing Protocols in Ad Hoc Wireless Networks” , International Journal of Modern Engineering Research (IJMER), Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645.
Sahabul Alam and Debashis De ,” Analysis of Security threats in wireless sensor network ”, International Journal of Wireless & Mobile Networks(IJWMN) Vol. 6, No. 2, April 2014.
Raju M, Selvan M “An Approach in Detection of Replication Node in Wireless Sensor Networks: A Survey ”, International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 192-196.
H.Weerasinge and H.Fu ―Preventing Black Hole journal of engineering science and technology, vol. 4,Attack in Mobile Ad hoc Networks: simulation, no. 2 pp. implementation and evaluation international journal of software engg. and its applications, vol2,no3 in MANET‖, Journal Of Networks, Vol. 3, NO. 5.
Jian Yin, Sanjay Madria, ―A Hierarchical Secure Routing Protocol against Black Hole, IEEE SUTC 2012 Taiwan, 5-7 June 2012.
Dokurer, S.;Ert, Y.M.;and Acar, C.E.(2011). Performance analysis of ad hoc networks under black hole attacks. SoutheastCon, 2011, Proceedings IEEE,148–153.
Dr. Karim Konate and Abdourahime Gaye(2011) a proposal mechanism against the attacks: cooperative black hole, blackmail, overflow and selfish in routing protocol of mobile ad hoc network”, international journal of future generation communication and networking Vol.4, No. 2.
S. Roy, S. Singh, S. Choudhary, and N. Debnath. ―Countering sinkhole and black hole attacks on networks using dynamic trust management ‖; In IEEE Symposium on Computers and Communications, 2008; pp. 537–542.
Niharika Singh Matharu and Avtar Singh Buttar. ”An Efficient Approach for Localization using Trilateration Algorithm based on Received Signal Strength in Wireless Sensor Network”, International Journal of Computer Sciences and Engineering, Volume-03, 2015, Issue-08
Tao Shu, Marwan Krunz and Sisi Liu, ―Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes‖ In IEEE INFOCOM, 2009. pp. 2846–2850.
G. Sladic , M. Vidakovic and Z. Konjovic ―Agent based system for network availability and vulnerability monitoring 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics, September 8-10, 2011, Subotica, Serbia.
Satyajayant Misra, Kabi Bhattarai, and Guoliang Xue ―BAMBi: Black hole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings.
Atul Yadav et al., ―Study of Network Layer Attacks and Countermeasures in Wireless Sensor Network International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4, August 2012.
Gulshan Kumar, Mritunjay Rai and Gang-soo Lee ― Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement- International Journal of Security and Its Applications Vol. 6, No. 1, January, 2012
M. Ketel, N.Dogan, A.Homaifar―Distributed Sensor Networks Based on Mobile Agents Paradigm‖ International Conference on Artificial Intelligence and Embedded Systems (ICAIES'2012) Singapore, 2012;
S. Sharma and R. Gupta, (2012) ―Simulation study of black hole attack in the mobile ad-hoc networks.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
