A light-weight solution for blackhole attacks in wireless sensor networks

被引:6
作者
Bilgin, Bilal Erman [1 ]
Baktir, Selcuk [1 ]
机构
[1] Bahcesehir Univ, Fac Engn & Nat Sci, Dept Comp Engn, Istanbul, Turkey
关键词
Wireless sensor networks; security; blackhole nodes; routing; ad-hoc on-demand distance vector routing protocol; SECURITY; LOCALIZATION; NODE;
D O I
10.3906/elk-1809-23
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensors, which are smaller and cheaper, have started being used in many different applications. Military applications, health care and industrial monitoring, environmental applications, smart grids, and vehicular ad-hoc networks are some of the best known applications of wireless sensors. In some applications, especially military, environmental, and health care applications, it is required that the communication between sensor nodes be encrypted to achieve privacy and confidentiality. In this work, some modifications have been made to the ad-hoc on-demand distance vector routing protocol, mostly preferred in wireless sensor networks, to make data communications more reliable. The proposed routing protocol is shown to be capable of detecting and eliminating malicious blackhole nodes. It also secures the transmitted data. The proposed mechanism has been compared with the original ad-hoc on-demand distance vector routing protocol in terms of average end-to-end delay and data delivery ratio. The performance evaluations show that the proposed secure routing protocol eliminates malicious nodes in the network. Furthermore, it achieves almost the same delivery ratios as the original ad-hoc on-demand distance vector routing protocol and does not cause extra communication delay.
引用
收藏
页码:2557 / 2570
页数:14
相关论文
共 36 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[3]  
[Anonymous], 2017, COMPUTER INFORM SECU
[4]   Whac-A-Mole: Smart node positioning in clone attack in wireless sensor networks [J].
Ben Jaballah, Wafa ;
Conti, Mauro ;
File, Gilberto ;
Mosbah, Mohamed ;
Zemmari, Akka .
COMPUTER COMMUNICATIONS, 2018, 119 :66-82
[5]   Survey and benchmark of lightweight block ciphers for MSP430 16-bit microcontroller [J].
Cazorla, Mickael ;
Gourgeon, Sylvain ;
Marquet, Kevin ;
Minier, Marine .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :3564-3579
[6]   WiSeN: A new sensor node for smart applications with wireless sensor networks [J].
Dener, Murat .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 :380-394
[7]  
Deshmukh SR, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P1960, DOI 10.1109/RTEICT.2016.7808179
[8]   Security in wireless sensor networks [J].
Du, Xiaojiang ;
Chen, Hsiao-Hwa .
IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) :60-66
[9]  
Elmahdi E, 2018, 2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P463, DOI 10.1109/CCWC.2018.8301683
[10]   Information attacks and security in wireless sensor networks of industrial SCADA systems [J].
Finogeev, Alexey G. ;
Finogeev, Anton A. .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2017, 5 :6-16