scholarly journals A Review on Black Hole Attack Detection in Wireless Sensor Networks

Author(s):  
K. Sutha
2020 ◽  
Vol 15 (1) ◽  
pp. 56-64
Author(s):  
A. John Clement Sunder ◽  
A. Shanmugam

Background: Wireless Sensor Networks (WSNs) are self-configured infrastructure-less networks are comprising of a number of sensing devices used to monitor physical or environmental quantities such as temperature, sound, vibration, pressure, motion etc. They collectively transmit data through the network to a sink where it is observed and analyzed. Materials and Methods: The major issues in WSN are interference, delay and attacks that degrade their performance due to their distributed nature and operation. Timely detection of attacks is imperative for various real time applications like healthcare, military etc. To improve the Black hole attack detection in WSN, Projected Independent Component Analysis (PICA) technique is proposed herewith, which detects black hole attack by analyzing collected physiological data from biomedical sensors. Results: The PICA technique performs attack detection through Mutual information to measure the dependence in the joint distribution. The dependence among the nodes is identified based on the independent probability distribution functions and mutual probability function. Conclusion: The black hole attack isolation is then performed through the distribution of the attack separation message. This supports to improve Packet Delivery Ratio (PDR) with minimum delay. The simulation is carried out based on parameters such as black hole attack detection rate (BHADR), Black Hole Attack Detection Time (BHADT), False Positive Rate (FPR), PDR and delay.


Author(s):  
Sachin Lalar ◽  
. Monika ◽  
Arun Kumar Yadav

Wireless sensor networks (WSNs) establish a new popular of ambient supervision with many latent packages. The environment of wireless sensor networks prone to different forms of attacks as networks are prepared in open and unsecured surroundings. This paper analyses the overall performance of AODV whilst attacked by black hole, through varying the mobility of the nodes within the community. The overall performance metrics which can be used to do the analysis are LPR, packet delivery ratio & Packet loss. The simulation consequences display that the overall performance of each AODV degrades in the presence of black hole attack.


2014 ◽  
Vol 573 ◽  
pp. 418-423
Author(s):  
S. Asha Latha ◽  
A. Sivabalan

Wireless sensor networks consist of a network of autonomous sensors that can reconfigure themselves so as to sense the environment in the most significant manner. However, a significant challenge in the practical application of these networks exists in credible authentication and network security. This paper proposes a secure authentication protocol which is considered as a pro-active method, where a user is strongly verified before accessing the data, it is the modified Adhoc On-Demand Distance vector (AODV) Routing protocol that provides many security principles to the user such as checking sequence number, IP address and threshold values. The performance of proposed algorithm is compared with the existing alogorithm based on the following parameters such as Throughput, End to End delay and packet delivery ratio. The results shows that the proposed protocol possesses many advantages against the popular black hole attack. This work has been carried out using NS2 software and the result obtained testifies the effectiveness of the proposed protocol. Keyword: Authentication protocol, AES security, AODV routing protocol, Black hole attack, Wireless sensor network (WSN).


Wireless Sensor Networks are in rapid advance occupying every field of our lives. They are in great demand and are widely used in transmission of data like temperature, pressure, humidity, speed etc. As these networks are wireless and are easily prone to intrusion by the attackers. Hence the basic concern is security of data. The nodes in the network will be sending information between the nodes, and in between the nodes intrusion takes place with attack like wormhole attack, black hole attack, sybil attack, hello flood attack etc. which corrupts data. These attacks effect the efficiency of the network and the parameters like packet delivery ratio and throughput of the network is affected. Black hole is a severe attack in network which alters most of the data before it is received at the sink, hence has to be detected and prevented. In this paper, Adhoc on demand distance vector (AODV) protocol is used to detect and prevent the black hole attack using Network Simulator (NS-2.3)


Sign in / Sign up

Export Citation Format

Share Document