Security against Black Hole Attack in Wireless Sensor Network - A Review

A wireless sensor network consists of geologically distributed autonomous sensors to monitor and control over physical or environmental conditions, like temperature, sound, pressure etc. And this information is passed through sensors in the network to a next location. Military applications was required the development of security in wireless sensor networks. Today such networks are used in many areas like industrial, health, and commercial applications. Black hole attack is occurs, when an intermediary captures and re-programs a set of nodes in the network to block/drop the packets and generates false messages instead of forwarding correct/true information towards the base station in wireless sensor network. Nearby many techniques have been proposed in the literature for detection and prevention of black hole attack in sensor network. There are various solutions proposed in the literature which identifies black hole attack and provides successful delivery of data to the base station. The literature survey showing techniques suffers from very little false positives. Here our paper focuses on review on black hole attack and also elaborates security against black hole attack. We are suggesting some feasible security model to further enhancement to tackling of black hole attack in the wireless sensor network.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Emil Jovanov,et al.  Performance Comparison between TEA and Rijndael Encryption Algorithm for Wireless Sensor Networks , 2002, CAINE.

[3]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[4]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[5]  Satyajayant Misra,et al.  BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[6]  G Kiran Kumar,et al.  Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2014 .

[7]  Roger M. Needham,et al.  TEA, a Tiny Encryption Algorithm , 1994, FSE.

[8]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[9]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008 .

[10]  Lui Sha,et al.  Real-time communication and coordination in embedded sensor networks , 2003, Proc. IEEE.

[11]  Albert G. Greenberg,et al.  Detection and Localization of Network Black Holes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[12]  Shuang Liu,et al.  Implementing the TEA algorithm on sensors , 2004, ACM-SE 42.

[13]  Muhammad Sher,et al.  Challenges for Security in Wireless Sensor Networks (WSNs) , 2011 .

[14]  Issa M. Khalil,et al.  DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[15]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[16]  Wenjing Lou,et al.  H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks , 2006, IEEE Transactions on Vehicular Technology.

[17]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[18]  Huirong Fu,et al.  Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.

[19]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[20]  Jitender S. Deogun,et al.  Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks , 2009, Wirel. Networks.

[21]  Satyajayant Misra,et al.  Efficient anonymity schemes for clustered wireless sensor networks , 2006, Int. J. Sens. Networks.

[22]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[23]  Jongwon Yoon,et al.  Multiple-Objective Metric for Placing Multiple Base Stations in Wireless Sensor Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[24]  ChrisKarlof NaveenSastry,et al.  TinySec: TinyOS Link LayerSecurityProposal - version 1.0 , 2002 .

[25]  Michael R. Lyu,et al.  An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks , 2007, Comput. Commun..

[26]  H. Chris Tseng,et al.  Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.

[27]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[28]  Dong Hoon Lee,et al.  Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[29]  Chenyang Lu,et al.  Priority Scheduling in TinyOS : A Case Study , 2002 .

[30]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[31]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[32]  Yuguang Fang,et al.  SPREAD: enhancing data confidentiality in mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[33]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[34]  Colin Cooper,et al.  Searching for Black-Hole Faults in a Network Using Multiple Agents , 2006, OPODIS.

[35]  Gang Qu,et al.  Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[36]  Nicola Santoro,et al.  Improved Bounds for Optimal Black Hole Search with a Network Map , 2004, SIROCCO.

[37]  Farnam Jahanian,et al.  The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.

[38]  Dhiren R. Patel,et al.  Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks , 2008, ICISS.

[39]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008, TRIDENTCOM.

[40]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[41]  Hyotaek Lim,et al.  Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption , 2007, IACR Cryptol. ePrint Arch..