Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks

被引:5
作者
Kaur, Gurjinder [1 ]
Jain, V. K. [1 ]
Chaba, Yogesh [2 ]
机构
[1] St Longowal Inst Engn & Technol, Longowal, India
[2] Guru Jambheshwar Univ Sci & Technol, Hisar, Haryana, India
来源
INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017) | 2017年 / 10618卷
关键词
Wireless sensor network; Sensor node; Blackhole attack;
D O I
10.1007/978-3-319-69155-8_8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent past Wireless Sensor Network has emerged as a promising technology and has proved to be a leading motivational force for a new innovation namely Internet of Things. Due to characteristics constraints, security is one of key challenge to sustain the performance of wireless sensor networks. Blackhole attack is a major threat for Wireless Sensor Network in which an intruder absorbs the traffic intended for base station by introducing a malicious node. In this paper a new technique is proposed to detect and prevent blackhole attack in Wireless Sensor Network. The simulation results obtained with the proposed technique establishes that in the event of blackhole attack the malicious node is successfully detected and usage of proposed technique prevents the deterioration in the performance of Wireless Sensor Network.
引用
收藏
页码:118 / 126
页数:9
相关论文
共 16 条
  • [1] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296
  • [2] Routing techniques in wireless sensor networks: A survey
    Al-Karaki, JN
    Kamal, AE
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) : 6 - 28
  • [3] Antoine-Santoni T., 2006, 1 INT S ENV ID MED A
  • [4] Routing security in wireless ad hoc networks
    Deng, HM
    Li, W
    Agrawal, DP
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 70 - 75
  • [5] Gao HS, 2014, LECT NOTES COMPUT SC, V8631, P601, DOI 10.1007/978-3-319-11194-0_53
  • [6] Wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 370 - 380
  • [7] A survey of secure wireless ad hoc routing
    Hu, YC
    Perrig, A
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 28 - 39
  • [8] Jian Y., 2006, IEEE INT C SENS NETW
  • [9] A survey of routing attacks in mobile Ad Hoc networks
    Kannhavong, Bounpadith
    Nakayama, Hidehisa
    Nemoto, Yoshiaki
    Kato, Nei
    Jamalipour, Abbas
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 85 - 91
  • [10] Lal C., 2015, INT J COMPUTER APPL, V115, P32