Open Access   Article Go Back

Survey of Black Hole Attack Detection Techniques in Wireless Sensor Network

R. Chinthamani1 , V. Selvi2

Section:Survey Paper, Product Type: Journal Paper
Volume-8 , Issue-10 , Page no. 127-132, Oct-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i10.127132

Online published on Oct 31, 2020

Copyright © R. Chinthamani, V. Selvi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Chinthamani, V. Selvi, “Survey of Black Hole Attack Detection Techniques in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.10, pp.127-132, 2020.

MLA Style Citation: R. Chinthamani, V. Selvi "Survey of Black Hole Attack Detection Techniques in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 8.10 (2020): 127-132.

APA Style Citation: R. Chinthamani, V. Selvi, (2020). Survey of Black Hole Attack Detection Techniques in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 8(10), 127-132.

BibTex Style Citation:
@article{Chinthamani_2020,
author = {R. Chinthamani, V. Selvi},
title = {Survey of Black Hole Attack Detection Techniques in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2020},
volume = {8},
Issue = {10},
month = {10},
year = {2020},
issn = {2347-2693},
pages = {127-132},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5243},
doi = {https://doi.org/10.26438/ijcse/v8i10.127132}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i10.127132}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5243
TI - Survey of Black Hole Attack Detection Techniques in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - R. Chinthamani, V. Selvi
PY - 2020
DA - 2020/10/31
PB - IJCSE, Indore, INDIA
SP - 127-132
IS - 10
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
195 296 downloads 161 downloads
  
  
           

Abstract

Secure sending is a problematic task because of the partial nature of wireless sensor network properties. This paper provides solution to recognize malicious nodes in wireless sensor networks concluded prevention of black hole attack. It is basically a set of portable hosts associated wirelessly without slightly central management, where respectively node acts as a packet contributor, packet receiver, and a router at the same time. According to the landscape of this system, the active topology and the absence of a central management source some security problems and occurrences, such as the black hole attack, the wormhole attack, and the impression and negation attack. In this survey, we are going to introduce the Black Hole attack security issues and some of the recognition systems used to distinguish the black hole attack. In this kind of attack (black hole attack) the interlopers manipulate the normal performance of the network, by introduc0069ng themselves as the node with the shortest path to the destination. Interlopers can do a malicious behaviour over the network. Our future approach based on a new routing algorithm which educations shortest path in order to avoid malicious node path. Our results demonstrate the success and the effectiveness of our proposed routing procedure.

Key-Words / Index Term

WSN, HMM, Black Hole, Malicious, Shortest path

References

[1]. Filippini, Massimo, and Lester C. Hunt. “Energy demand and energy efficiency in the OECD countries: a stochastic demand frontier approach.” Energy Journal32 (2): 59–80. 2011
[2]. Sohraby, K., Minoli, D., and Znati, T. “Wireless sensor networks: technology, protocols, and applications.” John Wiley and Sons. 2007
[3]. Rawat, P., Singh, K. D., Chaouchi, H., and Bonnin, J. M.“Wireless sensor networks: a survey on recent developments and potential synergies.” The Journal of supercomputing 68(1): 1–48. 2014.
[4]. Kalkha, H., Satori, H., and Satori, K “Performance Evaluation of AODV and LEACH Routing Protocol.” Advances in Information Technology: Theory and Application. .2016.
[5]. Kalkha, H., Satori, H., and Satori, K. ()“A Dynamic Clustering Approach for Maximizing Scalability in Wireless Sensor Network.Transactions on Machine Learning and Artificial Intelligence 2017.
[6]. Akyildiz, I. F., Su, W., S Sankarasubramaniam, Y., and Cayirci, E. “Wireless sensor networks: a survey.” Computer networks, 38(4):393–422. 2002.
[7]. Zia, T., and Zomaya, A. “Security issues in wireless sensor networks.” In Systems and Networks Communications. ICSNC`06. International Conference IEE. 40. 2006
[8]. Sunitha, K., and Chandrakanth, H. “A survey on security attacks in wireless sensor network.” International Journal of Engineering Research and Applications (IJERA), 2(4), 1684–1691. 2012.
[9]. SARVARI, S., et al.: Wireless Local Area Network. “A Comprehensive Review Of Attacks And Metrics.” Journal of Theoretical & Applied Information Technology. 95, no. 13. 2017
[10]. Abraham, A., Falcon, R., and Koeppen, M. “Computational Intelligence in Wireless Sensor Networks: Recent Advances and Future Challenges”. Vol. 676. 2017 Springer .
[11]. Singh, G., and Singh, J. “Prevention of Blackhole Attack in Wireless Sensor Network using IPSec Protocol.” International Journal of Advanced Research in Computer Science, 4(11). 2013
[12]. Saghar, K., Kendall, D., and Bouridane, A. “Application of formal modeling to detect black hole attacks in wireless sensor network routing protocols.” In Applied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference. IEEE. 191–194. 2014, January
[13]. Wazid, M., Katal, A., Sachan, R. S., Goudar, R. H., and Singh, D. P. (2013, April). “Detection and prevention mechanism for blackhole attack in wireless sensor network.” In Communications and Signal Processing (ICCSP), 2013 International Conference.IEEE. 576–581.
[14]. Gondwal, N., and Diwaker, C.() “Detecting blackhole attack in WSN by check agent using multiple base stations.” American International Journal of Research in Science, Technology, Engineering & Mathematics, 3(2), 149–152. 2013
[15]. Baadache, A., and Belmehdi, A.()“Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks.” Computer Networks, 73, 173–184. 2014
Irshad Ullah and Shoaib Ur Rehman, “Analysis of Black Hole Attack on Mobile Ad Hoc Networks using Different Manet Routing Protocols” June 2010.
[16]. Sevil Sen, John A. Clark, Juan E.Tapiador, “Security Threats in Mobile Ad Hoc Networks”.
[17]. Tarunpreet Bhatia, A.K.Verma, “Security Issues in MANET: A Survey on Attacks and Defense Mechanism”, International Journal of Advanced Research in Computer Science and Software Engineering, vol.3, issue 6, pp.1382- 1394, 2013.
[18]. Kriti Gupta, Maansi Gujral and Nidhi, “Secure Detection Technique Against Blackhole Attack For Zone Routing Protocol in MANETS”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Volume 2, Issue 6, June 2013.
[19]. Hesiri Weerasinghe and Huirong Fu, Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation, Intenational Journal of Software Engineering and its Application, Vol.2, Issue 3, July 2008.
[20]. Ramaswamy S, Fu H, Sreekantaradhya M, Dixon J, Nygard K, Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks, Paper presented at the International Conference on Wireless Networks, Las Vegas, Nevada, USA, 23-26 June 2003.
[21]. Raj PN, Swadas PB, DPRAODV: A Dynamic Learning System against Blackhole Attack in AODV based MANETs, International Journal of Computer Science Issue, Vol. 2, pp 54-59, 2009.
[22]. Tamilselvan L, Sankaranarayanan V, Prevention of Blackhole Attack in MANET, 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, Sydney, Australia, 27-30 August 2007.
[23]. Yaser khamayseh, Abdulraheem Bader, Wail Mardini, Muneer BaniYasein, in "A New Protocol for Detecting Black Hole Nodes in Adhoc Network, Internalional Journal of COllununication Networks and Infonnation Se curity (IJCNlS), Vol. 3, No. I,April 201
[24]. .Sun B, Guan Y, Chen J, Pooch UW , Detecting Black-hole Attack in Mobile Ad Hoc Networks, 5th European Personal MobileCommunications Conference, Glasgow, United Kingdom, 22-25 April 2003.
[25]. Chethan K C, Shobha rani A, Dr. T G Basavaraju,Scalable Local Route Repair-Hybrid Wireless Mesh Protocol (SLRR-HWMP) for IEEE 802.11, International Journal of Computer Science and Engineering, Volume 8 Issue 5,page no: 173-184
[26]. Adetoye Adeyemo Comparative Analysis of Various Denials Of Service (Dos) Attack Mitigation Techniques, International Journal of Computer Science and Engineering, Volume 8 Issue 4,page no: 162-167