Preventing Black Hole Attack in Wireless Sensor Network Using HMM

Abstract Secure routing is a difficult task because of the limited nature of wireless sensor network resources. This paper provides a Hidden Markov Model solution to identify malicious nodes in wireless sensor networks through prevention of black hole attack. Our proposed approach based on a new routing algorithm which analyses shortest path in order to avoid malicious node path. Our results demonstrate the success and the efficiency of our proposed routing algorithm.

[1]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[2]  Jean-Marie Bonnin,et al.  Wireless sensor networks: a survey on recent developments and potential synergies , 2013, The Journal of Supercomputing.

[3]  L. Hunt,et al.  Energy Demand and Energy Efficiency in the OECD Countries: A Stochastic Demand Frontier Approach , 2011 .

[4]  Chander Diwaker,et al.  DETECTING BLACKHOLE ATTACK IN WSN BY CHECK AGENT USING MULTIPLE BASE STATIONS , 2013 .

[5]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[6]  Abderrahmane Baadache,et al.  Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks , 2014, Comput. Networks.

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[8]  S. B. Dhonde,et al.  A survey on security attacks in wireless sensor networks , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[9]  Khalid Satori,et al.  Performance Evaluation of AODV and LEACH Routing Protocol , 2016 .

[10]  Andrew J. Viterbi,et al.  Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.

[11]  J. Y. Yen Finding the K Shortest Loopless Paths in a Network , 1971 .

[12]  K. Mani Chandy,et al.  Distributed computation on graphs: shortest path algorithms , 1982, CACM.

[13]  K. Thilagam,et al.  Modified AODV Protocol against Blackhole Attacks in MANET , 2010 .

[14]  Khalid Satori,et al.  A Dynamic Clustering Approach for Maximizing Scalability in Wireless Sensor Networ , 2017 .

[15]  S. Eddy Hidden Markov models. , 1996, Current opinion in structural biology.