Open Access   Article Go Back

A Study of Neural Networks based Blackhole Attack Protection in WSNs

G. Vinothini1

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-04 , Page no. 225-228, Feb-2019

Online published on Feb 28, 2019

Copyright © G. Vinothini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G. Vinothini, “A Study of Neural Networks based Blackhole Attack Protection in WSNs,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.04, pp.225-228, 2019.

MLA Style Citation: G. Vinothini "A Study of Neural Networks based Blackhole Attack Protection in WSNs." International Journal of Computer Sciences and Engineering 07.04 (2019): 225-228.

APA Style Citation: G. Vinothini, (2019). A Study of Neural Networks based Blackhole Attack Protection in WSNs. International Journal of Computer Sciences and Engineering, 07(04), 225-228.

BibTex Style Citation:
@article{Vinothini_2019,
author = {G. Vinothini},
title = {A Study of Neural Networks based Blackhole Attack Protection in WSNs},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2019},
volume = {07},
Issue = {04},
month = {2},
year = {2019},
issn = {2347-2693},
pages = {225-228},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=758},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=758
TI - A Study of Neural Networks based Blackhole Attack Protection in WSNs
T2 - International Journal of Computer Sciences and Engineering
AU - G. Vinothini
PY - 2019
DA - 2019/02/28
PB - IJCSE, Indore, INDIA
SP - 225-228
IS - 04
VL - 07
SN - 2347-2693
ER -

           

Abstract

A Wireless Sensor Network (WSN) is a collection of sensor nodes, which builds up a network using radio communication in an autonomous. This spoofing technique can be executed using blackhole or sinkhole attacks, which are used to fetch the streams of data leading to cluster heads or base stations usually. In this paper, we are addressing the issue of a variant of DDoS attack: Selective-Jamming Attack as TDMA is prone to a particularly insidious form of jamming attack, namely Selective Jamming (SJ).

Key-Words / Index Term

Blackhole, Neuralnetworks, Selective jamming, TDMA

References

[1] Marco Tiloca, Domenico De Guglielmo, GianlucaDini and Giuseppe Anastasi, “SAD-SJ: a Self-Adaptive Decentralized solution against Selective Jamming attack in Wireless Sensor Networks”, ETFA, vol. 18, pp. 1-8, IEEE,2013.
[2] Md. MonzurMorshed, Md. Rafiqul Islam, “CBSRP: Cluster Based Secure Routing Protocol”, IACC, vol. 3, pp. 571-576, IEEE,2013.
[3] Patrice Seuwou, Dilip Patel, Dave Protheroe, George Ubakanma “Effective Security as an ill-defined Problem in Vehicular Ad hoc Networks (VANETs)”.
[4] Muhammad A. Javed and Jamil Y. Khan “A Geocasting Technique in an IEEE802.11p based Vehicular Ad hoc Network for Road Traffic Management”.(2010).
[5] Chia-Chen Hung, Hope Chan, and Eric Hsiao-Kuang Wu “Mobility Pattern Aware Routing for Heterogeneous Vehicular Networks”( IEEE WCNC 2008).
[6] JoãoA. Dias, João N. Isento, Vasco N. G. J. Soares, FaridFarahmand, and Joel J. P. C. Rodrigues “Testbed-based Performance Evaluation of Routing Protocols for Vehicular Delay-Tolerant Networks” (2011IEEE).
[7] Steffen Moser, Simon Eckert and Frank Slomka “An Approach for the Integration of Smart Antennas in the Design and Simulation of Vehicular Ad-Hoc Networks” 2012 IEEE.