CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks

by Chunnu Lal, Akash Shrivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 16
Year of Publication: 2015
Authors: Chunnu Lal, Akash Shrivastava
10.5120/20236-2516

Chunnu Lal, Akash Shrivastava . An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks. International Journal of Computer Applications. 115, 16 ( April 2015), 32-37. DOI=10.5120/20236-2516

@article{ 10.5120/20236-2516,
author = { Chunnu Lal, Akash Shrivastava },
title = { An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 16 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number16/20236-2516/ },
doi = { 10.5120/20236-2516 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:55:01.051929+05:30
%A Chunnu Lal
%A Akash Shrivastava
%T An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 16
%P 32-37
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSNs) are currently used in many application areas such as military applications, control and tracking applications, habitat monitoring applications where they face attacks already experienced by the Internet and wireless ad hoc networks. One such attack is that of Blackhole Denial-of-Service (DoS). In Blackhole attack a node captures all data packets coming to it. WSNs have Sensor Nodes which have limited energy and processing capability. With the resource limitations of WSN devices, they are particularly susceptible to the consumption and destruction of these scarce resources. Denial-of-Service (DoS) attacks have become a major threat to WSNs. It is critical challenge to develop the effective and lightweight security mechanism to detect and prevent various attacks for WSN, especially for the Denial-of-Service (DoS) attack. This paper discusses current state of art in various security mechanisms which detect and prevent the Blackhole Denial-of-Service (DoS) attack in WSNs and proposed an energy-preserving detection mechanism against Blackhole attack.

References
  1. Fall, K. and Varadhan, K. 1997. Editors ns Notes and Documentation. The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC.
  2. Afrand, Agah and Sajal, K. 2007. Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. International Journal of Network Security, 5(2):145–153.
  3. Arazil, O. , Qi, H. and Rose, D. 2007. A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks. IEEE Sensor, Mesh and Ad Hoc Communications and Networks, pp. 51-59.
  4. Prathapani, A. , Santhananr, L. and Agrawal, D. P. 2009. Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks. IEEE 6th International Conference on Mobile Adhocand Sensor System (MASS), pp. 753-758.
  5. Medadian, M. , Mebadi, A. and Shahri, E. 2009. Combat with Black Hole Attack in AODV Routing Protocol. IEEE MalaysiaInternational Conference on Communications, pp. 530-535.
  6. Anastasi, G. , Conti, M. , Di Francesco, M. and Passarella, A. 2009. Energy conservation in wireless sensor networks: a survey. Ad Hoc Networks, ScienceDirect, 7: 537–668.
  7. Ben-Othman, J. and Yahya, B. 2010. Energy efficient and QoS based routing protocol for wireless sensor networks. Journal of Parallel and Distributed Computing, ScienceDirect, 70(8):849–857.
  8. Misra, S. , Bhattarai, K. , and Xue, G. 2011. BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks. IEEE International Conference on Communications (ICC), pp. 1-5.
  9. Babu. , N. V. , Boregowda, S. B. , Puttamadappa, Shivaraj. and Davanakatti, S. 2012. An optimized weight based clustering algorithm in heterogeneous wireless sensor networks. Sundarapandian et al. (Eds): ICAITA, SAI, SEAS, CDKP, CMCA, CS & IT 08, pp. 185–195.
  10. Ballarini, P. , Mokdad, L. and Monnet, Q. 2013. Modeling tools for detecting DoS attacks in WSNs. Security and Communication Networks Wiley Online Library, 6(4):420–436.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSNs) Denial-of-Service (DoS) Attack Sensor Node (SN) Base Station (BS)