CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Reserve Path based Black Hole Detection and Prevention Algorithm in Wireless Sensor Network

by Rajvir Kaur, Harpreet Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 7
Year of Publication: 2017
Authors: Rajvir Kaur, Harpreet Kaur
10.5120/ijca2017915839

Rajvir Kaur, Harpreet Kaur . A Reserve Path based Black Hole Detection and Prevention Algorithm in Wireless Sensor Network. International Journal of Computer Applications. 178, 7 ( Nov 2017), 30-35. DOI=10.5120/ijca2017915839

@article{ 10.5120/ijca2017915839,
author = { Rajvir Kaur, Harpreet Kaur },
title = { A Reserve Path based Black Hole Detection and Prevention Algorithm in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2017 },
volume = { 178 },
number = { 7 },
month = { Nov },
year = { 2017 },
issn = { 0975-8887 },
pages = { 30-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number7/28694-2017915839/ },
doi = { 10.5120/ijca2017915839 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:49:46.834830+05:30
%A Rajvir Kaur
%A Harpreet Kaur
%T A Reserve Path based Black Hole Detection and Prevention Algorithm in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 7
%P 30-35
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to various characteristics of WSN, network is too unsafe and open for malicious attacks. Attackers can easily comprised an attacking node that causes information loss and network degradation. Numbers of solutions are cumbersome and vitality inefficient. In this paper a novel approach has been proposed for detection and elimination of black hole attack comprised nodes. Proposed approach is based on threshold value and reverse tracking process for detection and elimination of malicious node. TDMA policy has been used for transmission of information from a cluster to sink node. Results show that proposed approach is much efficient rather than that of previous one.

References
  1. A. Vijayalakshmi, T. Shrimathy and T. G. Palanivelu, “Mobile agent middleware security for Wireless Sensor Networks,”2014 International Conference on Communication and Signal Processing, Melmaruvathur, 2014, pp. 1669-1673.
  2. S. Ahmad Salehi, M. A. Razzaque, P. Naraei and A. Farrokhtala, “Detection of sinkhole attack in wireless sensor networks,”2013 IEEE International Conference on Space Science and Communication (IconSpace), Melaka, 2013, pp. 361-365.
  3. C. T. Hsueh, C. Y. Wen and Y. C. Ouyang, “A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks,” in IEEE Sensors Journal, vol. 15, no. 6, pp. 3590-3602, June 2015.
  4. Debiao He, N. Kumar and N. Chilamkurti, “A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks,”International Symposium on Wireless and pervasive Computing (ISWPC), Taipei, 2013, pp. 1-6.
  5. M. Guerroumi, A. Derhab and K. Saleem, “Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink,”2015 12th International Conference on Information Technology - New Generations, Las Vegas, NV, 2015, pp. 307-313.
  6. R. Geetha, S. R. Anand and E. Kannan, “Fuzzy logic based compromised node detection and revocation in clustered wireless sensor networks,”International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, 2014, pp. 1-6.
  7. Guanglai Chen, Shoujun Wang and Lifei Li, “Notice of Retraction The design of wireless wave height sensor network node based on Zigbee technology,”2011 International Conference on Electric Information and Control Engineering, Wuhan, 2011, pp. 3683-3686.
  8. H. Chen, Z. Han and Z. Fu, "Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks," 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 2015, pp. 1272-1278.
  9. I. Makhdoom, M. Afzal and I. Rashid, “A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks,”2014 National Software Engineering Conference, Rawalpindi, 2014, pp. 1-6.
  10. J. Krithiga and R. C. Porselvi, “Efficient CodeGuard mechanism against pollution attacks in interflow Network coding,”2014 International Conference on Communication and Signal Processing, Melmaruvathur, 2014, pp. 1384-1388.
  11. R. Mittal and M. P. S. Bhatia, “Wireless sensor networks for monitoring the environmental activities,”2010 IEEE International Conference on Computational Intelligence and Computing Research, Coimbatore, 2010, pp. 1-5.
  12. N. Marriwala and P. Rathee, “An approach to increase the wireless sensor network lifetime,”2012 World Congress on Information and Communication Technologies, Trivandrum, 2012, pp. 495-499.
  13. R.Muhammad and H.Syed Irfan ,”A force routing information modification model for preventing black hole attacks in wireless adhoc network “ , IEEE 2011.
  14. Priya and Puri “Remove of selective black hole attack with upstream node and downstream node alarm system by dynamic source protocol (DSP)” International journal of advanced engineering technology Vol.5, No. 5,2015,
  15. Karakehayov (2005).”Using REWARD to detect team black-hole attacks in wireless sensor networks” International Journal of Innovative Research in Science Engineering and Technology.
  16. Karuppiah, Dalfiah and R. Yuvashri,”An improvised hierarchical black hole detection algorithm in wireless “international conference information in computing technologies (ICIICT), Chennai, India 2015.
  17. Ahmed, S. and Sanjay, “The holes problem in wireless sensor network” mobile computing and communications review, Vol.1, No.2, 2014.
  18. G. Nitesh and D. Diwaker,”Detecting blackhole attack in wsn by check agent using multiple base stations”, American International Journal of Research in Science, Technology, Engineering & Mathematics, 2013
  19. R.K, Prakash and Mishra “A Review on Black Hole/Sink Hole Attack Detection and Prevention in WSNs” International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 5, Issue 6,2015
  20. B.R. and V.N. “Black hole Attacks Prevention in Wireless Sensor Network by Multiple Base Station Using of Efficient Data Encryption Algorithms” International Journal of Advent Research in Computer & Electronics, Vol.1, No.2, 2014.
  21. Tseng, Chou And Chao“A survey of black hole attacks in wireless mobile ad hoc networks” Human centric computing and information sciences. 2011.
Index Terms

Computer Science
Information Sciences

Keywords

AODV Black Hole Security Goals WSN