A Reserve Path based Black Hole Detection and Prevention Algorithm in Wireless Sensor Network

Due to various characteristics of WSN, network is too unsafe and open for malicious attacks. Attackers can easily comprised an attacking node that causes information loss and network degradation. Numbers of solutions are cumbersome and vitality inefficient. In this paper a novel approach has been proposed for detection and elimination of black hole attack comprised nodes. Proposed approach is based on threshold value and reverse tracking process for detection and elimination of malicious node. TDMA policy has been used for transmission of information from a cluster to sink node. Results show that proposed approach is much efficient rather than that of previous one.

[1]  Shoujun Wang,et al.  Notice of Retraction The design of wireless wave height sensor network node based on Zigbee technology , 2011 .

[2]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[3]  M. P. S Bhatia,et al.  Wireless sensor networks for monitoring the environmental activities , 2010, 2010 IEEE International Conference on Computational Intelligence and Computing Research.

[4]  Ali Farrokhtala,et al.  Detection of sinkhole attack in wireless sensor networks , 2013, 2013 IEEE International Conference on Space Science and Communication (IconSpace).

[5]  Naveen K. Chilamkurti,et al.  A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, International Symposium on Wireless and pervasive Computing (ISWPC).

[6]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[7]  Chander Diwaker,et al.  DETECTING BLACKHOLE ATTACK IN WSN BY CHECK AGENT USING MULTIPLE BASE STATIONS , 2013 .

[8]  S. Rajaram,et al.  An improvised hierarchical black hole detection algorithm in Wireless Sensor Networks , 2015, International Confernce on Innovation Information in Computing Technologies.

[9]  Sarvesh Kumar,et al.  A Review on Black Hole/Sink Hole Attack Detection and Prevention in WSNs , 2015 .

[10]  Imran Rashid,et al.  A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks , 2014, 2014 National Software Engineering Conference.

[11]  Kashif Saleem,et al.  Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink , 2015, 2015 12th International Conference on Information Technology - New Generations.

[12]  Zhongchuan Fu,et al.  Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[13]  N. Marriwala,et al.  An approach to increase the wireless sensor network lifetime , 2012, 2012 World Congress on Information and Communication Technologies.

[14]  Yen-Chieh Ouyang,et al.  A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[15]  E. Kannan,et al.  Fuzzy logic based compromised node detection and revocation in clustered wireless sensor networks , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).

[16]  T. G. Palanivelu,et al.  Mobile agent middleware security for Wireless Sensor Networks , 2014, 2014 International Conference on Communication and Signal Processing.

[17]  Ms. B. R. Baviskar,et al.  Black hole Attacks Prevention in Wireless Sensor Network by Multiple Base Station Using of Efficient Data Encryption Algorithms , 2014 .

[18]  R. C. Porselvi,et al.  Efficient CodeGuard mechanism against pollution attacks in interflow Network coding , 2014, 2014 International Conference on Communication and Signal Processing.

[19]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .