Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN (original) (raw)

A New Protocol for Detecting Black Hole

An ad hoc network is a collection of infrastructureless nodes, cooperating dynamically to form a temporary network which meets certain immediate needs. The lack of infrastructure implies that the nodes are connected peer-to-peer. Therefore, each node acts as a router beside its main role as a host. With the increased number of mobile devices, the applications of ad hoc network increased dramatically to capture different domains such as: academic communication, and mobile conferencing beside its traditional domains such as: military communication, and emergency communication. Security issues become more challenging in ad hoc network due to its dynamic nature which allows any node to freely join as well as leave the network without having a physical address or getting permission. Ad hoc networks are vulnerable to different kinds of attacks such as: denial of services, impersonation, and eavesdropping. This paper discusses one of the security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behavior during the process of route discovery. For any received RREQ, the black hole claims having a route and propagates a faked RREP. The source node responds to these faked RREPs and sends its data through the received routes. Once the data is received by the black hole, it is dropped instead of being sent to the desired destination. The proposed protocol is built on top of the original AODV. It extends the AODV to include the following functionalities: source node waits for a reliable route; each node has a table in which it adds the addresses of the reliable nodes; RREP is overloaded with an extra field to indicate the reliability of the replying node. The simulation of the proposed protocol shows significant improvement in the terms of: packet delivery ratio, number of dropped packets, and end-to-end delay. The overhead still needs more researches.

Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sensor Networks

IRJET, 2022

Security is a most important concern for MANET and attacker are extremely simply manipulated by the genuine performance and operation of the network. In this research project we provide a defense system against single black hole attacks and collaboratively at MANET. Blackhole attack drop packet attack behaves like a normal node during connection and after a false response sending location to the sender lowers all data packets. In this attack one or more than one malicious nodes create a secure environment with the presence of other continuously abut node exist in network and provides the secure communication in dynamic setup. The attacker is only the nodes which are not forwarded packets to destination and also attacker/s is being a element of communication with each and every sender. The proposed IDS are not detect single black hole but also able to handle multiple black hole. The attacker nodes dropping are very harmful that dump actual presentation of network. The routing protocol is not able to defend the network from malicious activities. The black hole attacker is network layer routing attack and the projected plan is surely removes the attacker infection from the dynamic network and improves network performance .normal nodes. The proposed IDS

An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks

International Journal of Computer Applications, 2015

Wireless sensor networks (WSNs) are currently used in many application areas such as military applications, control and tracking applications, habitat monitoring applications where they face attacks already experienced by the Internet and wireless ad hoc networks. One such attack is that of Blackhole Denial-of-Service (DoS).In Blackhole attack a node captures all data packets coming to it. WSNs have Sensor Nodes which have limited energy and processing capability. With the resource limitations of WSN devices, they are particularly susceptible to the consumption and destruction of these scarce resources. Denial-of-Service (DoS) attacks have become a major threat to WSNs. It is critical challenge to develop the effective and lightweight security mechanism to detect and prevent various attacks for WSN, especially for the Denial-of-Service (DoS) attack. This paper discusses current state of art in various security mechanisms which detect and prevent the Blackhole Denial-of-Service (DoS) attack in WSNs and proposed an energy-preserving detection mechanism against Blackhole attack.

Detection methods for wormhole attack in WSN

Wireless communication technique has become an important tool in any application that requires communication between one or more senders and multiple receivers. Security is becoming a major concern for this wireless communication. Wireless sensor networks consist of a large number of small sensor nodes that constantly monitors environmental conditions but due to the partial resources of the nodes and hostile & pervasive environments. so this kind of nature of wireless sensor networks make them very attractive to attacks at all network layers; however, the so-called “wormhole attack”. In wormhole an attacker receives packets at one point in the network, “tunnels” them to another point in the network, and then replays them into the network from that point. In this paper, we will study wormhole attack and some of the methods for detecting of wormhole attack.

Detection of Wormhole Attack in WSN Using Hybrid Approach

Journal of Scientific Computing, 2020

Wireless sensor networks utilized by the large number of fields due to its advantages. To attain data reliability it allows any node to join in network and it also allows the node to leave without any proper authentication. This results in data loss, user data mishandling, and un-trustable network. This characteristic made WSN is more vulnerable to passive or active attacks. In this paper we propose hybrid mechanism to detect and avoid wormhole attack. This type of attack voluntarily advertises the shortest path to the destination to misbehave in the transaction. Hence in our proposed model, a methodology to detect wormhole nodes has been implemented. To achieve this we propose a hybrid approach for effectively preventing data from wormhole attack. The hybrid approach is a combination of watchdog and RTT. It detects attack accurately and ensures secure data transactions. For securing data from other forms of attack MD5 encryption algorithm is used. The proposed method analysed by using parameters called Average Throughput, End to End Delay, and packet drop count.

An improvised hierarchical black hole detection algorithm in Wireless Sensor Networks

International Confernce on Innovation Information in Computing Technologies, 2015

Due to the specific characteristics, Wireless Sensor Networks (WSN) are severely unsafe and are open to malicious attacks. One of the most malicious threats to WSN is in the form of black hole attack that target the routing protocols. This genre of attacks can have a very serious impact on hierarchical routing protocols. A variety of security solutions have been put forth to safeguard WSNs from black hole attacks. However, a majority of the solutions are cumbersome and vitality inefficient. In this paper an improvised hierarchical vitality efficient intrusion detection system is proposed, to protect sensor Network from black hole attacks. Our proposed approach is simple and is based on exchange of control packets between sensor node and base station. The results show that our proposed algorithm is effective in detecting and preventing efficiently the black hole attacks.

A Framework to Detect Black Hole Attack in WSN Using Multi Base Stations Based Mechanism

2017

As wireless senor network (WSN) has broad range application that needs privacy of sensed data while they transmit from source to base station. Providing robust and reliable data aggregation scheme with securing sampled data is a challenging problem in WSN. This paper discusses about secure data aggregation and proposed the new secure cluster based aggregation of private data scheme using the LEACH protocol. The proposed scheme (Cb-SDA) is based on the additive property of complex number to aggregate the sensor data in order to provide the privacy during their transmission over the base station and provide better security for wireless sensor network routing with efficient performance in terms of energy consumption, throughput, delay, bandwidth utilization, jitter etc. Simulation study evaluates the performance of proposed scheme and calculates aggregation privacy, communication overhead and accuracy in terms of throughput and compare to existing approach.

A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks

An ad hoc network is a collection of infrastructureless nodes, cooperating dynamically to form a temporary network which meets certain immediate needs. The lack of infrastructure implies that the nodes are connected peer-to-peer. Therefore, each node acts as a router beside its main role as a host. With the increased number of mobile devices, the applications of ad hoc network increased dramatically to capture different domains such as: academic communication, and mobile conferencing beside its traditional domains such as: military communication, and emergency communication. Security issues become more challenging in ad hoc network due to its dynamic nature which allows any node to freely join as well as leave the network without having a physical address or getting permission. Ad hoc networks are vulnerable to different kinds of attacks such as: denial of services, impersonation, and eavesdropping. This paper discusses one of the security problems in ad hoc networks called the black hole problem. It occurs when a malicious node referred as black hole joins the network. The black hole conducts its malicious behavior during the process of route discovery. For any received RREQ, the black hole claims having a route and propagates a faked RREP. The source node responds to these faked RREPs and sends its data through the received routes. Once the data is received by the black hole, it is dropped instead of being sent to the desired destination. The proposed protocol is built on top of the original AODV. It extends the AODV to include the following functionalities: source node waits for a reliable route; each node has a table in which it adds the addresses of the reliable nodes; RREP is overloaded with an extra field to indicate the reliability of the replying node. The simulation of the proposed protocol shows significant improvement in the terms of: packet delivery ratio, number of dropped packets, and end-to-end delay. The overhead still needs more researches.

DETECTION AND ISOLATION TECHNIQUE FOR BLACKHOLE ATTACK IN WIRELESS SENSOR NETWORK

A wireless sensor network (WSN) comprises of countless spread over a particular territory where we need to take care of at the progressions going ahead there. A sensor hub, for the most part, comprises of sensors, actuators, memory, a processor and they do have correspondence capacity. These sorts of networks are much powerless against security attacks. Many kinds of active and passive attacks are conceivable in the sensor network. Among all the conceivable active attacks, sinkhole attack is the most widely recognized and destructive attack. This attack debases network execution and prompts denial of service attack. The attack is triggered by the malicious hub which is available in the network. In this work, a novel strategy has been proposed to recognize and disengage malicious nodes from the network which are in charge of triggering the attack. The novel procedure is based on blacklist technique and clustering technique. The exploratory results will demonstrate that proposed strategy detects and separate the malicious nodes from the network proficiently. It will enhance network effectiveness as far as bundle misfortune, defer and expand throughput of the network. NS2 simulator instrument will be utilized as a part of it.

Researchpaper A-Survey-of-Different-Techniques-for-Detection-of-Wormhole-Attack-in-Wireless-Sensor-Network

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc and sensor network is the wormhole attack. It is a particularly severe attack on routing protocols for ad hoc networks in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. When this attack targets routing control packets, the nodes that are close to the attackers are defended from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. This paper focuses on Wormhole attack detection in wireless sensor network. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. In This paper we have discussed and compared some of the very popular techniques for detecting this kind of attack.