scholarly journals Detection and Elimination of Black Hole Attack in WSN

Wireless Sensor Network has become one of the most emerging areas of research in recent days. WSNs have been applied in a variety of application areas such as military, traffic surveillance, environment monitoring and so on. Since WSN is not a secure network and each sensor node can be compromised by the intruder. There are plenty of security threats in sensor networks like Black hole Attack, Wormhole attack, Sinkhole attack. Recently, there are so many algorithms are proposed to detect or to prevent attack by the researchers. Still, the research is continuing to evaluate sensor nodes' trust and reputation. At present to monitor nodes’ behavior direct and indirect trust values are used and most of the detection method uses additional nodes to detect an attack. These method increases the cost and also overhead. This paper proposed a method which detects the Black hole attack without using any additional node to monitor the network. The proposed work uses Attacker Detection metric (AD metric) to detect malicious node based on the average sequence number, time delay and reliability. OLSR protocol is used for routing which improves the network lifetime by minimizing the packet flooding. Besides, to ensure reliable data transmission Elliptical Curve Digital Signature Algorithm is used. Simulation results are obtained and show malicious nodes are eliminated using AD metrics

2017 ◽  
Author(s):  
Pathan Aiyaz Khan

Network which is not connected by any type of cable is a wireless network. The main purpose of using wireless network is that it enables users to avoid the cost of introducing cable lines in the building or making connection between different locations. These networks are highly affected by network attack. One of these attacks are black hole attacks in which malicious node claims that it has the fresh and shortest path. As MANET doesn't have any standard infrastructure and the dynamic topology that makes these networks highly susceptible to security flaws like exploiting vulnerabilities to routing protocols and transferring harmful packets in the networks. These security issues results in adverse effect on this network. Now the task is to prevent MANET from these security threats. As this paper is based on DSR protocol hence we developed a scheme called the Cooperative Bait Detection Scheme (CBDS), which directly focus on detection and prevention of malicious nodes introducing gray hole/black hole attacks in MANETs. To implement this CBDS we use back tracing method. Hence from our proposed system we won't require any special hardware or detection node to prevent against blackhole attacks.


Author(s):  
Ramakanth Reddy Malladi ◽  
A. Govardhan

The routing security issues of MANETs are described. The Black hole attack, which can easily be deployed against MANET and an efficient technique to isolate the multiple black hole attack, is described. The proposed technique will be based on to analyze the route reply packets in which the nodes reply with the exceptional high sequence number is add into blacklist. To isolate these nodes from the network, technique of clustering will be applied this improvement leads to increase network performance. The future work may be concentrate on the proposed technique can be compared with some other technique of intrusion detection for mobile ad-hoc networks. And also the proposed technique can be applied for the detection of wormhole attack in the network. The malicious nodes which are increasing delay in the network.


2019 ◽  
Vol 8 (3) ◽  
pp. 8192-8198

Mobile Ad hoc Networks is configured by itself using the Mobile nodes in the Network, the maintenance also done by the wireless nodes itself. Dynamic topology, hop-to-hop communication and open-to-all are the features of MANETS, but these features made security of network highly challengeable. From security concern, routing protocols are highly vulnerable to many security threats like black hole attack. In black hole attack malicious node generates false routing information to the path requests about the route it asked for, which results all data packets forward toward it-self by the source and the black hole node manipulate its data. The cooperative black hole nodes in the other hand cooperate within the malicious nodes to fool the single black hole attack prevention algorithms. Here an approach is proposed to detecting the cooperative black holes nodes and eliminate them by broad casting there information into the network.


2016 ◽  
Vol 6 (2) ◽  
pp. 1-10
Author(s):  
Chaima Bensaid ◽  
Sofiane Boukli Hacene ◽  
Kamel Mohamed Faraoun

Vehicular networks or VANET announce as the communication networks of the future, where the mobility is the main idea. These networks should be able to interconnect vehicles. The optimal goal is that these networks will contribute to safer roads and more effective in the future by providing timely information to drivers and concerned authorities. They are therefore vulnerable to many types of attacks among them the black hole attack. In this attack, a malicious node disseminates spurious replies for any route discovery in order to monopolize all data communication and deteriorate network performance. Many studies have focused on detecting and isolating malicious nodes in VANET. In this paper, the authors present two mechanisms to detect this attack. The main goal is detecting as well as bypass cooperative black hole attack. The authors' approaches have been evaluated by the detailed simulation study with NS2 and the simulation results shows an improvement of protocol performance.


Author(s):  
Atifa Parveen ◽  
Shish Ahmad ◽  
Jameel ◽  
Ahmad

Ad hoc Network is a self organized autonomous network that consists of mobile nodes which communicate with each other over wireless links. One of the common attacks in MANETs is the Black hole Attack, in which malicious node falsely claiming it to have the fresh and shortest path to the destination and then drops all the receiving packets. The black hole attack is one of the well-known security threats in wireless mobile adhoc networks. We proposed a mechanism to mitigate single black hole attack to discover a safe route to the destination by avoiding attacks. In this paper we proposed an approach for better analysis and improve security of AODV, which is one of the popular routing protocols for MANET. Our scheme is based on AODV protocol which is improved by deploying improved DRI table with additional check bit. The Simulation on NS2 is carried out and the proposed scheme has produced results that demonstrate the effectiveness of the mechanism in detection and elimination of the attack and improve network performance by reducing the packet dropping ratio in network. In this paper, We not only classify these proposals into single black hole attack but also analyze the categories of these solutions.


2016 ◽  
Vol 2016 ◽  
pp. 1-20 ◽  
Author(s):  
Kresimir Grgic ◽  
Drago Zagar ◽  
Visnja Krizanovic Cik

The trend of implementing the IPv6 into wireless sensor networks (WSNs) has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.


2014 ◽  
Vol 13 (9) ◽  
pp. 5029-5038
Author(s):  
Deepali Raut ◽  
Kapil Hande

An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of service, Routing table overflow, Impersonation, Energy consumption, Information disclosure etc. A black hole attack node attracts all packets by falsely claiming a fresh route to the destination node and absorbs them without forwarding them to destination. In this work the effect of Black hole and Gray Hole attack on DSR protocol has been considered. Simulation has been performed on the basis of performance parameters and effect has been analyzed using NS2 simulator. 


Author(s):  
Sivaganesan D

Utilization of smart applications in various domains is facilitated pervasively by sensor nodes (SN) that are connected in a wireless manner and a number of smart things. Hazards due to internal and external attacks exist along with the advantages of the smart things and its applications. Security measures are influenced by three main factors namely scalability, latency and network lifespan, without which mitigation of internal attacks is a challenge. The deployment of SN based Internet of things (IoT) is decentralized in nature. However, centralized solutions and security measures are provided by most researchers. A data driven trust mechanism based on blockchain is presented in this paper as a decentralized and energy efficient solution for detection of internal attacks in IoT powered SNs. In grey and black hole attack settings, the message overhead is improved using the proposed model when compared to the existing solutions. In both grey and black hole attacks, the time taken for detection of malicious nodes is also reduced considerably. The network lifetime is improved significantly due to the enhancement of these factors.


Ad-hoc network is vulnerable to different types of attacks because of its vigorously changing topology, limited storage capacity, absence of centralized infrastructure etc. Adhoc On Demand Distance Vector (AODV) is established protocol for routing for this type of networks. AODV is exposed to black hole attack due to the inadequacy of security consideration. The malicious nodes drop all information packets rather than sending it to the neighboring node. In this research paper, Anomaly based intrusion detection system (IDS) known as Particle swarm optimization (PSO) is purposefully utilized to detect the misbehavior activities in the network. In AODV routing protocol, swarm agents are used for identifying misbehavior activities of nodes based on dropping behavior of data packets. An intrusion response system (IRS) is activated after the detection of an intrusion. It is necessary to take action against black hole attack or reduce the effect of the damage caused by the attack. IDS and a response system are integrated for detection and removal of the source of an attack respectively. The guard nodes are placed in the network with the aim to oppose black hole attackers and in this way IR is initiated. The malevolent nodes detected by PSO are bypassed and new routing paths are established using guard nodes. This research has been carried out for analyzing the influence of malicious nodes and guard nodes on varying network size vice versa. The simulation study of proposed technique integrated particle swarm optimization intrusion detection response system (IPSO-IDRS) explains how it is better in terms of the performance metric like throughput and PDR.


Sign in / Sign up

Export Citation Format

Share Document