Security Against Black Hole Attack In Wireless Sensor Network-A Review

被引:8
作者
Mishra, Binod Kumar [1 ]
Nikam, Mohan C. [1 ]
Lakkadwala, Prashant [1 ]
机构
[1] Dept Comp Sci & Engn, Indore, Madhya Pradesh, India
来源
2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT) | 2014年
关键词
Wireless sensor networks; black hole; black hole region; false messages; security; ROUTING SECURITY; DATA-COLLECTION; SPREAD;
D O I
10.1109/CSNT.2014.129
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A wireless sensor network consists of geologically distributed autonomous sensors to monitor and control over physical or environmental conditions, like temperature, sound, pressure etc. and this information is passed through sensors in the network to a next location. Military applications was required the development of security in wireless sensor networks. Today such networks are used in many areas like industrial, health, and commercial applications. Black hole attack is occurs, when an intermediary captures and re-programs a set of nodes in the network to block/drop the packets and generates false messages instead of forwarding correct/true information towards the base station in wireless sensor network. Nearby many techniques have been proposed in the literature for detection and prevention of black hole attack in sensor network. There are various solutions proposed in the literature which identifies black hole attack and provides successful delivery of data to the base station. The literature survey showing techniques suffers from very little false positives. Here our paper focuses on review on black hole attack and also elaborates security against black hole attack. We are suggesting some feasible security model to further enhancement to tackling of black hole attack in the wireless sensor network.
引用
收藏
页码:615 / 620
页数:6
相关论文
共 39 条
  • [1] Wireless sensor networks: a survey
    Akyildiz, IF
    Su, W
    Sankarasubramaniam, Y
    Cayirci, E
    [J]. COMPUTER NETWORKS, 2002, 38 (04) : 393 - 422
  • [2] Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks
    Al Nahas, Huzaifa
    Deogun, Jitender S.
    Manley, Eric D.
    [J]. WIRELESS NETWORKS, 2009, 15 (04) : 431 - 441
  • [3] [Anonymous], 2006, SECURITY DISTRIBUTED
  • [4] [Anonymous], 00010 NAI LABS NETW
  • [5] [Anonymous], AD HOC NETWORKS, DOI DOI 10.1016/S1570-8705(03)00008-8
  • [6] Bailey M., 2005, P 12 ISOC S NETW DIS, P167
  • [7] Cooper C, 2006, LECT NOTES COMPUT SC, V4305, P320
  • [8] Sinkhole intrusion indicators in DSR MANETs
    Culpepper, BJ
    Tseng, HC
    [J]. FIRST INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS, PROCEEDINGS, 2004, : 681 - 688
  • [9] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [10] Didla S., 2008, P 2008 TRIDENTCOM IN, P1