Open Access   Article Go Back

Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks

R.Sujatha 1 , P. Srivaramangai2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 165-168, Mar-2018

Online published on Mar 31, 2018

Copyright © R.Sujatha, P. Srivaramangai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R.Sujatha, P. Srivaramangai, “Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.165-168, 2018.

MLA Style Citation: R.Sujatha, P. Srivaramangai "Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks." International Journal of Computer Sciences and Engineering 06.02 (2018): 165-168.

APA Style Citation: R.Sujatha, P. Srivaramangai, (2018). Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks. International Journal of Computer Sciences and Engineering, 06(02), 165-168.

BibTex Style Citation:
@article{Srivaramangai_2018,
author = {R.Sujatha, P. Srivaramangai},
title = {Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {165-168},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=225},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=225
TI - Efficient Black Hole Attack Detection Mechanism for 6lowpan Wireless Networks
T2 - International Journal of Computer Sciences and Engineering
AU - R.Sujatha, P. Srivaramangai
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 165-168
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

In particular wireless networks, IPv6 Low Power over wireless personal area networks is a specific network configuration frame- work with the low power wireless devices with limited processing capabilities. In this network, the malicious node attacks over at the network layer. Moreover it is an unstable network, the formation of the path of networks only through the AODV Routing Protocol. In the view of security aspects the existing techniques were proposed in MANET but these are more vulnerable in 6LoWPAN Networks. It is increased number of packet dropping attacks like Black Hole attacks may cause the undesired operations in the time of routing the packet transfer. Thus the existing cryptographic systems are not sufficient to protect and very difficult and defend the routing protocol RPL. Here a new data aggregation based mechanism for black hole attack detection has been proposed in efficient manner. In this mechanism, the black hole node is detected by frequent monitoring and trustworthy prediction of reply packets that are transmitted by the sensor nodes and it will be removed from the network. The implementation results show that the improved efficiency in the detection of black hole attacks with MANET. More experiments were discussed about the detection mechanism in MANET.

Key-Words / Index Term

6LoWPAN, Wireless Sensor Networks, Black Hole Attacks, Routing Protocol, AODV, Data Aggregation

References

[1] Chunnu L and A Shrivastava, “An Energy Preserving Detection Mechanism for Black Hole Attack in Wireless Sensor Networks”, Intl. Journal of Computer Applications Vo.115, No.16, April 2015.
[2] D Nitnaware and A Thakur, “Black Hole Attack Detection and Prevention Strategy in DYMO for MANET”, 3rd Intl., Conf. on Signale Processing and Integrated Networks”,2016.
[3] B Singh, D Srikanth and C.R.S Kumar, “Mitigating effects of Black hole Attack in Mobile Ad-hoc Networks: Military Perspective”, IEEE Intl. Conf. on Engineering and Technology, March 2016.
[4] O Shivwanshi, R Patel and P Saxena, “ Cluster Based Secure WSN against the Balckhole and Grayhole Attack”, Intl. Journal of Computer Science and Information Technologies, Vol.6, No.6, 2015, pp.5470-5472.
[5] Anitta Vincent, Fincy Francis and Ayyappadas P.S, “Security Aspects in 6lowpan Networks”, IOSR Journal of Electronics and Communication Engineering, 2012.
[6] Kalaiselvan.K and Gurpreet Singh, “Detection and Isolation of Black Hole Attacks in Wireless Sensor Networks”, International Journal of Innovative Research in Science, Engineering and Technology, Vol.4, No.5, May 2015.
[7] R Hummen, J Hiller, H Wirtz, M Henze, H Shafagh and K Wehrle, “6LoWPAN Fragmentation Attacks and Mitigation Mechanisms”, Hungary, April, 2013.
[8] A Rghioui, A Khannous and M Bouhorma, “Denial of server attacks on 6LoWPAN-RPL networks: Threats and an intrusion detection system proposition”, Journal of Advanced Computer Science and Technology, Vol.3, No.2, pp.143-153, 2014.
[9] K Chugh, A Lasebae and J Loo, “Case Study of a Black Hole Attack on 6LoWPAN-RPL”, Securware 2012: The 6th Intl. Conf. on Emerging Security Information, Systems and Technologies, UK, 2012.
[10] Luis M.L. Oliveria, Joel.J.P.C Rodrigues, Amaro F.Sousa and Victor M.Denisov, “Network Admission Control Solution for 6LoWPAN Networks Based on Symmetric Key Mechanisms”, IEEE Trans. on Industrial Informatics, Vol.12, No.6, December 2016.
[11] Yue Qie and Maode Ma, “A Mutual Authenticaticaton and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks”, IEEE Trans. on Industrial Informatics, Vol.12, No.6, Decemeber 2016.
[12] F Ahmed and Young-Bae Ko, “Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks”, Article in Research Gate, October 2016.
[13] J Deny, A Sivaneshkumar, M. Sundarajan and V.Khanna, “Defensive against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach”, Intl. Conf. on Algorithms and Applications in Emerging Technologies, December 2017.
[14] R.Sujatha, Dr.P.Srivaramangai, ”Enhancing security in Manets Communication Issues and Mechanisms”, International Journal of Computer Techniques – Vol. 4 – Issues 3 (79 - 83) May – June 2017, ISSN: 2394–2231.
[15] R.Sujatha , Dr.P.Srivaramangai, “A Survey on Network Layer Attack Detection And Isolation Techniques in Manet” International Journal Of Modern Engineering Research (IJMER), vol. 07, no.12 , Dec - 2017, pp. 01 – 04.