Open Access Open Access  Restricted Access Subscription or Fee Access

Dynamic Routing in Wireless Sensor Networks under Black Hole Attack

Charulata C. Girsawale, S. A. Shirsat

Abstract


Wireless Sensor Networks (WSNs) are widely used in security-critical applications. Because of their inherent resource characteristics, they are prone to various security attacks, and a black hole attack is a type of attack that seriously affects data collection. To prevent that an active detection-based security and trust routing scheme named dynamic routing is used for WSNs. The most important features of dynamic routing is that it avoids black hole attack through the active creation of a number of detection routes to quickly detect and obtain nodal trust and thus improve the data route security. There are three scenarios of nodes. Those are only normal nodes, normal and black holes, after prevention of black holes. In these scenarios, the generation and distribution of detection routes are given in the dynamic routing scheme, which can fully use the energy to create as many detection routes as needed to achieve the desired security and energy efficiency. The key generation also provides security from the black holes. The algorithm is simulated using MATLAB. Its performance is evaluated in terms of average number of hops, average distance from base station and average energy per node. The simulation results show that after prevention of black holes energy consumption is reduced. The prevention of black holes is done by secure route discovery which increases packet delivery ratio.


Keywords


Black Hole Attack, Energy Efficiency, Security, Wireless Sensor Network, Packet Delivery Ratio

Full Text:

PDF

References


M. Wazid, A. Katal, R. Singh Sachan, R. H. Goudar, D. P. Singh "Detection And Prevention Mechanism For Blackhole Attack In Wireless", IEEE International Conference On Communication And Signal Processing (ICCSP), 3-5 April 2013.

M. Atakli, H. Hu, Y. Chen, W-S. Ku, Z. Su "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation", In Proceedings Of The 2008 Spring Simulation Multiconference. Society for Computer Simulation International, pp 836-843.

Z. Karakehayov, "Using REWARD to detect team black-hole attacks in wireless sensor", Wksp. Real-World Wireless Sensor Networks June 2005, pp 20-21.

Hesiri Weerasinghe, Huirong Fu, “Preventing Cooperative Black Hole Attacks in Mobile Ad HocNetworks: Simulation Implementation and Evaluation”, IEEE International Conference On Future Generation Communication And Networking, 6-8 December 2007.

Fenye Bao, Ing-Ray Chen, Moon Jeong Chang and Jin-Hee Cho, “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection” IEEE Transactions on Network and Service Management, Vol. 9, No. 2, June 2012.

Nitesh Gondwal, Chander Diwaker, “Detecting Blackhole Attack In Wsn By Check Agent Using Multiple Base Stations”, American International Journal of Research in Science, Technology, Engineering & Mathematics,Vol. 3, No. 2, June-August, 2013, pp 149-152.

Jaspreet Kaur , Bhupinder Kaur, “BHDP Using Fuzzy Logic Algorithm For Wireless Sensor Network Under Black Hole Attack” , International Journal of Advance Research in Computer Science and Management Studies, Vol. 2, No.9 ,2014, pp 142-151.

Dr. Deepali Virmani ,Manas Hemrajani , Shringarica Chandel ,” Exponential Trust Based Mechanism to Detect Black Hole attack in Wireless Sensor Network”, arXiv preprint arXiv January 2014, pp 1401-2541

Theodore Zahariadis, Panagiotis Trakadas, Sotiris Maniatis, Panagiotis Karkazis, Helen C. Leligou, StamatisVoliotis, “Efficient detection of routing attacks in Wireless Sensor Networks”, IEEE 16th International Conference on Systems, Signals and Image Processing, 18 June 2009, pp 1-4.

Keecheon Kim ,Seryvuth Tan ,”Secure Route Discovery for Preventing Black Hole Attacks on AODV-based MANETs ”, IEEE International Conference On ICT Convergence, 14 October 2013, pp 1027-1032.

J. Luo, M. Fan, D. Ye, “Black Hole Attack Prevention Based On Authentication Mechanism”, 11th IEEE Singapore International Conference on Communication Systems, 2008. ICCS 2008.

P. Rohal, R. Dahiya, P. Dahiya,”Study and Analysis of Throughput, Delay and Packet Delivery Ratio in MANET for Topology Based Routing Protocols (Aodv, Dsr And Dsdv)”, International Journal For Advance Research In Engineering And Technology, Vol. 1, Issue II, Mar. 2013 ISSN 2320-6802.

S. Athmani, D. E. Boubiche, A. Bilami, “Hierarchical Energy Efficient Intrusion Detection System for Black Hole Attacks in WSNs” In Proceedings of the IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113-127, May 2013.

N. Zaman, T. J. Low, T. Alghamdi, “Enhancing Routing Energy Efficiency of Wireless Sensor Networks” ICACT Transactions on Advanced Communications Technology (TACT) Vol. 4, Issue 2, March 2015.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.