Open Access   Article Go Back

BLACK HOLE Attack: A New Detection Technique

Vipul Kumar1 , Musheer Vaqar2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-6 , Page no. 63-67, Jun-2016

Online published on Jul 01, 2016

Copyright © Vipul Kumar, Musheer Vaqar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vipul Kumar, Musheer Vaqar, “BLACK HOLE Attack: A New Detection Technique,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.6, pp.63-67, 2016.

MLA Style Citation: Vipul Kumar, Musheer Vaqar "BLACK HOLE Attack: A New Detection Technique." International Journal of Computer Sciences and Engineering 4.6 (2016): 63-67.

APA Style Citation: Vipul Kumar, Musheer Vaqar, (2016). BLACK HOLE Attack: A New Detection Technique. International Journal of Computer Sciences and Engineering, 4(6), 63-67.

BibTex Style Citation:
@article{Kumar_2016,
author = {Vipul Kumar, Musheer Vaqar},
title = {BLACK HOLE Attack: A New Detection Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2016},
volume = {4},
Issue = {6},
month = {6},
year = {2016},
issn = {2347-2693},
pages = {63-67},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=968},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=968
TI - BLACK HOLE Attack: A New Detection Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Vipul Kumar, Musheer Vaqar
PY - 2016
DA - 2016/07/01
PB - IJCSE, Indore, INDIA
SP - 63-67
IS - 6
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1599 1357 downloads 1486 downloads
  
  
           

Abstract

Due to the wireless nature and infrastructure-less environment of WSN, they are more vulnerable to many types of security attacks. This paper proposes a technique to detect the black-hole attack using multiple base-stations and a check agent based technology. This technique is Energy efficient, Fast, Lightweight and Reduces message complexity. An effective solution is proposed that uses multiple base stations to improve the delivery of the packets from the sensor nodes reaching at least one base station in the network, thus ensuring high packet delivery success. The proposed technique is more efficient than the previous techniques and gives better results. Check agent is a software program which is self-controlling and monitoring, smart homes, structures, target it moves from node to node and checks wireless nodes envelop embedded electronic sensors along with battery and RF devices. The purpose of these sensors is to sense and recognize diverse biological parameters, for instance, temperature, pressure, air pollution etc., to communicate with the neighboring nodes and compute the gathered data. Their application space is huge as they can be deployed in various fields like agriculture the presence tracking, health care, and military surveillance and of black-hole nodes in the network. Routing through multiple base stations algorithm is only activated when there is a chance of black-hole attack on the network. This method prevents the black hole attack imposed by both single and multiple black hole nodes. The tool used to implement the proposed algorithm is NS2, which is an object oriented event drive software package. The result of the simulation study expected to get good network performance by minimizing the packet losses as well as effectively prevent the black hole attack against wireless sensor networks. A solution to avoid the black hole attack has been proposed. The solution will be implemented in NS-2.

Key-Words / Index Term

WSN, Black-hole attacks, multiple base stations & Check agent.

References

[1] Sanjeev Gangwar “Mobile Ad Hoc Network Routing Protocols: a Detailed Performance Examination of AODV, DSR and DSDV” , International Journal of Computer Applications , Volume 49– No.9, July 2012.
[2] Simanta Sarma, Binita Devi ,” Security Attacks on Routing Protocols in Ad Hoc Wireless Networks” , International Journal of Modern Engineering Research (IJMER), Vol.2, Issue.6, Nov-Dec. 2012 pp-4502-4509 ISSN: 2249-6645.
[3] Sahabul Alam and Debashis De ,” Analysis of Security threats in wireless sensor network ”, International Journal of Wireless & Mobile Networks(IJWMN) Vol. 6, No. 2, April 2014.
[4] Raju M, Selvan M “An Approach in Detection of Replication Node in Wireless Sensor Networks: A Survey ”, International Journal of Computer Science and Information Technologies, Vol. 5 (1) , 2014, 192-196.
[5] H.Weerasinge and H.Fu ―Preventing Black Hole journal of engineering science and technology, vol. 4,Attack in Mobile Ad hoc Networks: simulation, no. 2 pp. implementation and evaluation international journal of software engg. and its applications, vol2,no3 in MANET‖, Journal Of Networks, Vol. 3, NO. 5.
[6] Jian Yin, Sanjay Madria, ―A Hierarchical Secure Routing Protocol against Black Hole, IEEE SUTC 2012 Taiwan, 5-7 June 2012.
[7] Dokurer, S.;Ert, Y.M.;and Acar, C.E.(2011). Performance analysis of ad hoc networks under black hole attacks. SoutheastCon, 2011, Proceedings IEEE,148–153.
[8] Dr. Karim Konate and Abdourahime Gaye(2011) a proposal mechanism against the attacks: cooperative black hole, blackmail, overflow and selfish in routing protocol of mobile ad hoc network”, international journal of future generation communication and networking Vol.4, No. 2.
[9] S. Roy, S. Singh, S. Choudhary, and N. Debnath. ―Countering sinkhole and black hole attacks on networks using dynamic trust management ‖; In IEEE Symposium on Computers and Communications, 2008; pp. 537–542.
[10] Niharika Singh Matharu and Avtar Singh Buttar. ”An Efficient Approach for Localization using Trilateration Algorithm based on Received Signal Strength in Wireless Sensor Network”, International Journal of Computer Sciences and Engineering, Volume-03, 2015, Issue-08
[11] Tao Shu, Marwan Krunz and Sisi Liu, ―Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes‖ In IEEE INFOCOM, 2009. pp. 2846–2850.
[12] G. Sladic , M. Vidakovic and Z. Konjovic ―Agent based system for network availability and vulnerability monitoring 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics, September 8-10, 2011, Subotica, Serbia.
[13] Satyajayant Misra, Kabi Bhattarai, and Guoliang Xue ―BAMBi: Black hole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings.
[14] Atul Yadav et al., ―Study of Network Layer Attacks and Countermeasures in Wireless Sensor Network International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4, August 2012.
[15] Gulshan Kumar, Mritunjay Rai and Gang-soo Lee ― Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement- International Journal of Security and Its Applications Vol. 6, No. 1, January, 2012
[16] M. Ketel, N.Dogan, A.Homaifar―Distributed Sensor Networks Based on Mobile Agents Paradigm‖ International Conference on Artificial Intelligence and Embedded Systems (ICAIES'2012) Singapore, 2012;
[17] S. Sharma and R. Gupta, (2012) ―Simulation study of black hole attack in the mobile ad-hoc networks.