Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

BHnFDIA : Energy Efficient Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 96 - Number 23
Year of Publication: 2014
Authors:
Tanuja R
S H Manjula
K R Venugopal
L M Patnaik
10.5120/16931-6957

Tanuja R, S H Manjula, K R Venugopal and L M Patnaik. Article: BHnFDIA : Energy Efficient Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks. International Journal of Computer Applications 96(23):1-8, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Tanuja R and S H Manjula and K R Venugopal and L M Patnaik},
	title = {Article: BHnFDIA : Energy Efficient Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {96},
	number = {23},
	pages = {1-8},
	month = {June},
	note = {Full text available}
}

Abstract

Wireless Sensor Networks (WSNs) are currently being used in a wide range of applications including military areas that demand high security requirements. WSNs are susceptible to various types of attacks as they are unsupervised in nature. Since sensor network is highly resource constrained, providing security to data transmission becomes a challenging issue. Attacks must be detected and eliminated from the network as early as possible to enhance the rate of successful transmissions. In this paper, an energy efficient algorithm is proposed to eliminate Black Hole and False Data Injection Attack (BHnFDIA) to overcome black hole attack in WSNs using a new acknowledgement based scheme with less overhead. Every intermediate node check the authenticity and integrity of the received packet. The authentic packets will be forwarded and malicious packets will be discarded immediately. The proposed scheme can eliminate false data injection by outside malicious nodes and Black hole attack by compromised insider nodes. Simulation results show that the scheme can successfully identify and eliminate 100% black hole nodes. Malicious packets are immediately removed with 100% filtering efficiency. The scheme ensures more than 99% packet delivery with increased network traffic.

References

  • Tanveer Zia, Albert Zomaya, "Security Issues in Wireless Sensor Networks," Proc. Intl Conf. Systems and Networks Communication (ICSNC 06), Oct. 2006.
  • Uluagac A. S, R. A Beyah, Y. Li,J. A. Copeland, "VEBEK : Virtual Energy-Based Encryption and keying forWireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 994-1007, July 2010.
  • Misra S, Bhattarai K, Guoliang Xue, "BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks ," Proc. International Conf. Communications( ICC 2011), July 2011.
  • L. K Bysani, A. K Turuk, "A Survey On Selective Forwarding Attack in Wireless Sensor Networks," Proc. International Conf. on Devices and Communications (ICDeCom), Feb 2011.
  • Kaplantzis. S, Shilton. A, Mani. N. , Sekercioglu. Y. A, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines ," Proc. Third International Conf. on Intelligent sensors, Sensor Networks and Information pp 335340, Dec 2007.
  • Zhen Yu, Yong Guan, "A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks," IEEE/ACM Transactions on Networking, vol. 18, no. 1, pp. 150-163, Feb. 2010.
  • H. Hou, C. Corbett, Y. Li, R. Beyah, "Dynamic Energy-based Encoding and Filtering in Sensor Networks," Proc. IEEE Military Comm. Conf. (MILCOM 07), Oct. 2007.
  • Uluagac A. S, R. A Beyah, J. A Copeland, "TIme-Based DynamiC keying and En-Route Filtering (TICK) for Wireless Sensor Networks," Proc. IEEE Global Telecommunications Conf. (GLOBECOM 2010), Dec. 2010.
  • Lin He, Yi-Ying Zhang, Lei Shu, A. V Vasilakos Myong- Soon Park, "Energy-efficient Location-dependent key management Scheme for Wireless Sensor Networks," Proc. 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), Dec 2010.
  • M. Ba, I. Niang, B. Gueye, T. Noel, "A Deterministic key Management Scheme for Securing Cluster-based Sensor Networks," Proc. 2010 IEEE/IFIP Intl Conf. on Embedded and Ubiquitous Computing, pp. 422-427, Dec 2010.
  • Y. Hu, Y. Lin, Y. Liu, W. Zeng, "RAS:A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks," Proc 15th Intl Conf. on Networks,2007 (ICON 2007), pp. 200-205,Nov 2007.
  • C. Braub,M. Schneider, K. Bayarou, C. Eckert, "STEF:A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks," Proc. Second Intl Conf. on Availability, Reliability and Security (ARES 07), April 2007.
  • C. Wang,T. Wei, "The Design of an En-route Filtering Mechanism with Immediately Lightweight Authentication for Wireless Sensor Networks," Proc. 2010 Intl Computer Symposium (ICS), pp. 364-369, Dec 2010.
  • T. Yuan, S. Zhang, Y. Zhong, J. Ma, "KAEF:An En-route Scheme of Filtering False Data in Wirelss Sensor Networks," Proc. IEEE Intl Conf. on Performance, Computing and Communications, 2008 (IPCCC 2008), pp. 193-200, Dec 2008.
  • K. Ren, W. Lou, Y. Zhang, "LEDS: Providing Location- Aware End-to-End Data Security in Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008.
  • B. H Kim, S. Y Moon, H. Y Lee, C. Sun, T. H Cho, "Cluster Adaptation Method to Enhance Performance of Filtering Scheme in Sensor networks," Proc. 11th Intl Conf. on Advanced Communication Technology (ICACT 2009), pp. 411- 416, Feb 2009.