A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks

被引:33
作者
Wazid, Mohammad [1 ]
Das, Ashok Kumar [1 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
关键词
Hierarchical wireless sensor networks; Blackhole attacks; Detection and prevention; NS2; Security; INTRUSION DETECTION SYSTEMS; USER AUTHENTICATION SCHEME; ANOMALY DETECTION; ATTACKS;
D O I
10.1007/s11277-016-3676-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Rapid development of the wireless communication technology and low cost of sensing devices has accelerated the development of wireless sensor networks (WSNs). These types of networks have a wide range of applications including habitat monitoring, health monitoring, data acquisition in hazardous environmental conditions and military operations. Sensor nodes are resource constrained having limited communication range, battery and processing power. Sensor nodes are prone to failure and can be also physically captured by an adversary. One of the main concerns in WSNs is to provide security, especially in the cases where they are deployed for military applications and monitoring. Further, WSNs are prone to various attacks such as wormhole, sinkhole and blackhole attacks. A blackhole attack is a kind of denial of service attack, which is very difficult to detect and defend and such blackhole attack, if happens, affects the entire performance of the network. In addition, it causes high end-to-end delay and less throughput with less packet delivery ratio. The situation can be worst if multiple blackhole attacker nodes present in the network. As a result, detection and prevention of the blackhole attack becomes crucial in WSNs. In this paper, we aim to propose a new efficient group-based technique for the detection and prevention of multiple blackhole attacker nodes in WSNs. In our approach, the entire WSN is divided into several clusters and each cluster has a powerful high-end sensor node (called a cluster head), which is responsible for the detection of blackhole attacker nodes, if present, in that cluster. The proposed scheme achieves about 90 % detection rate and 3.75 % false positive rate, which are significantly better than the existing related schemes. Furthermore, our scheme is efficient and thus, it is very appropriate for practical applications in WSNs.
引用
收藏
页码:1165 / 1191
页数:27
相关论文
共 39 条
[1]   On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks [J].
Abduvaliyev, Abror ;
Pathan, Al-Sakib Khan ;
Zhou, Jianying ;
Roman, Rodrigo ;
Wong, Wai-Choong .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (03) :1223-1237
[2]  
AES. Advanced Encryption Standard, 2001, FIPS PUB, V197
[3]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[4]   An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks [J].
Chatterjee, Santanu ;
Das, Ashok Kumar .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) :1752-1771
[5]   An improved key distribution mechanism for large-scale hierarchical wireless sensor networks [J].
Cheng, Yi ;
Agrawal, Dharma P. .
AD HOC NETWORKS, 2007, 5 (01) :35-48
[6]  
Das A. K., 2009, P 1 INT COMM SYST NE, P1
[10]   A dynamic password-based user authentication scheme for hierarchical wireless sensor networks [J].
Das, Ashok Kumar ;
Sharma, Pranay ;
Chatterjee, Santanu ;
Sing, Jamuna Kanta .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) :1646-1656