Open Access Open Access  Restricted Access Subscription or Fee Access

A Comparative Study on Security Attacks for Data Mining based Security Models in Wireless Sensor Networks

Hossam Mahmoud, Kenneth J. Loh

Abstract


A wireless sensor network consists of geologically distributed autonomous sensors to monitor and control over physical or environmental conditions, like temperature, sound, pressure etc. and this information is passed through sensors in the network to a next location. Wireless sensor network is a trending technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. The many researchers have conducted different detection techniques and algorithms to proposed different types of detection schemes. This presents real challenges in the implementation of the following security requirements for WSNs. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. This paper discusses various literatures related to the black hole attack detection and prevention techniques. A Comparative study has been made along with further extension of the work.


Keywords


Mobile Ad-Hoc Networks, Blackhole Attacks, Machine Learning and Data Mining.

Full Text:

PDF

References


A. Bhosle, T. P. Thosar, and S. Mehatre, “Black-hole and wormhole attack in routing protocol AODV in MANET,” International Journal of Computer Science, Engineering and Applications (IJCSEA), vol. 2, no. 1, pp. 45-54, 2012.

G. S. Bindra, A. Kapoor, A. Narang, and A. Agrawal, “Detection and removal of co-operative blackhole and grayhole attacks in WSN,” in Proceedings of International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, 2012, pp. 1-5.

J. M. Chang, P. C. Tsou, I. Woungang, H. C. Chao, and C. F. Lai, “Defending against collaborative attacks by malicious nodes in WSN: a cooperative bait detection approach,” IEEE Systems Journal, vol. 9, no. 1, pp. 65-75, 2015.

M. B. M. Kamel, I. Alameri, and A. N. Onaizah, “STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based WSN,” in Proceedings of IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing, China, 2017, pp. 1278-1282.

Mishra, R. Jaiswal, and S. Sharma, “A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in ad hoc network,” in Proceedings of 3rd IEEE International Advance Computing Conference (IACC), Ghaziabad, India, 2013, pp. 499-504.

N. R. Yerneni and A. K. Sarje, “Secure AODV protocol to mitigate black hole attack in mobile ad hoc,” in Proceedings of 3rd International Conference on Computing Communication & Networking Technologies (ICCCNT), Coimbatore, India, 2012, pp. 1-5.

N. Sharma and A. Sharma, “The black-hole node attack in WSN,” in Proceedings of 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2012, pp. 546-550.

R. K. Bar, J. K. Mandal, and M. M. Singh, “QoS of WSN through trust based AODV routing protocol by exclusion of black hole attack,” Procedia Technology, vol. 10, pp. 530-537, 2013.

R. Kumar and R. Chadha, “Mitigation of black hole attack using generic algorithms and fuzzy logic,” International Journal of Engineering Sciences & Research Technology, vol. 5, no. 6, pp. 818-826, 2016.

R. Lakhwani, S. Suhane, and A. Motwani, “Agent based AODV protocol to detect and remove black hole attacks,” International Journal of Computer Applications, vol. 59, no. 8, pp. 35-39, 2012.

S. Biswas, T. Nag, and S. Neogy, “Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in WSN,” in Proceeding of Applications and Innovations in Mobile Computing (AIMoC), Kolkata, India, 2014, pp. 157-164.

S. Kumar and K. Dutta, “Intrusion detection technique for black hole attack in mobile ad hoc networks,” International Journal of Information Privacy, Security and Integrity, vol. 2, no. 2, pp. 81-101, 2015.

Sonia and H. Kaur, “Proficient and enhance the mobile ad-hoc network using routing protocol and EBFOA (Enhanced Bacteria Foraging Optimization Algorithm),” International Journal of Modern Computer Science, vol. 4, no. 6, pp. 88-94, 2016.

Woungang, S. K. Dhurandher, M. S. Obaidat, and R. D. Peddi, “A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks,” Security and Communication Networks, vol. 9, no. 5, pp. 420-428, 2016.

Woungang, S. K. Dhurandher, R. D. Peddi, and I. Traore, “Mitigating collaborative blackhole attacks on DSR-based mobile ad hoc networks,” in Proceedings of the International Symposium on Foundations and Practice of Security, Montreal, Canada, 2012, pp. 308-323.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.