Detection of Malicious node by Black Hole attack in Wireless Sensor Network based on Data Mining

Nitin A. Sakhare, Nilesh U. Sambhe

Abstract


A Wireless Sensor Network (WSN) is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Therefore the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, wireless Sensor Networks are unprotected to attacks of the malicious nodes. One of the most malicious threats to WSN is in the form of black hole attack that target the routing protocols. Ad-hoc On-Demand Distance Vector (AODV) Routing Protocol is used for finding a path to the destination in an ad-hoc network. To find the path to the destination all nodes work in cooperation using the routing control messages. AODV Routing Protocol offers quick adaptation to dynamic network conditions, low processing and memory overhead, low network bandwidth utilization with small size control messages. A wireless sensor network consists of a large number of small sensors with limited energy. Clustering the sensor nodes is an effective technique to achieve these goals. Network is divided into number of clusters. Nodes are assigned to the cluster having minimum distance to the cluster head having maximum energy. The distance is calculated using Euclidean Distance Formula. We propose a new protocol, RAEED (Robust formally Analyzed protocol for Wireless Sensor Networks Deployment), which is able to address the problem of black hole attacks. Using formal modeling we prove that RAEED avoids Black Hole attack.

Keywords


Wireless Sensor Network, Black Hole Attack, Cluster Head, AODV

References


Mohammad Wazid, Avita Katal, Roshan Singh Sachan, R H Goudar, D P Singh, “Detection and Prevention Mechanism for Blackhole Attack in Wireless Sensor Network,” in Proceeding of International conference on Communication and Signal Pro- cessings (ICCSP), 2013 International Conference, pp. 576-581.

Binod Kumar Mishra and Mohan C. Nikam, “Security against blackhole attack in wireless sensor network – A Review,” in Proceedings of Communication System and Network technolo- gies (CSNT), 2014 Fourth International Conference, pp.-615- 620.

Satyajayant Misra and Guoliang Xue , “BAMBi: Blackhole At- tacks Mitigation with Multiple Base Stations in Wireless Sensor Networks,” in Proceedings of communication (ICC),IEEE 2011 International conference, pp. 1-5.

Bajwa Shahid Shehzad, and Muhammad Khalid Khan, “Grouped Black hole Attacks Security Model (GBHASM) for Wireless Ad- Hoc Networks,” in Proceedings of Computer and Automation Engineering (ICCAE), 2010 The 2nd International Conference, vol. 1, pp. 756-760.

Taylor, Vincent F., and Daniel T. Fokum, “Mitigating black hole attacks in wireless sensor networks using node-resident ex- pert systems,” in Proceedings of Wireless Telecommunications Symposium (WTS), 2014, pp. 1-7.

Saghar Kashif, David Kendall, and Ahmed Bouridane, “Appli- cation of formal modeling to detect black hole attacks in wireless sensor network routing protocols,” in Proceedings ofApplied Sci- ences and Technology (IBCAST), 2014 11th International Bhur- ban Conference, pp. 191-194.

Raza Muhammad, and Syed Irfan Hyder, “A forced routing in- formation modification model for preventing black hole attacks in wireless Ad Hoc network,” In Proceedings of Applied Sci- ences and Technology (IBCAST), 2012 9th International Bhur- ban Conference, pp. 418-422.

Singh Harsh Pratap, and Rashmi Singh, “A mechanism for dis- covery and prevention of coopeartive black hole attack in mo- bile ad hoc network using AODV protocol,” In Proceedings of Electronics and Communication Systems (ICECS) 2014 Inter- national Conference, pp. 1-8.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




 


All Rights Reserved © 2012 IJARCSEE


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.