Cluster Computing

, Volume 22, Supplement 1, pp 1313–1328 | Cite as

Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust

  • Deepak C. MehetreEmail author
  • S. Emalda Roslin
  • Sanjeev J. Wagh


In the recent era, security is the major problem in sensor networks. Wireless sensor networks (WSNs) are mostly used for various real-world applications. However, WSNs face a lot of insider and outsider attacks, and it is complex to identify and protect towards insider attacks. Generally, an insider attack, in which the intruders choose several received data packets to drop, threatens the clustered WSNs. This situation has occurred because of the unattended clustered environments in the network. To overcome this problem, this paper proposes a trustable and secure routing scheme using two-stage security mechanism, and dual assurance scheme, for selecting the node and securing the data packet for WSNs. Both schemes are based on Active Trust to protect several kinds of attacks, such as black hole attack, and selective forwarding attack, during routing. Therefore, this paper identifies the trusted path and provides the secure routing paths using trust and Cuckoo search algorithm. Energy is the performance parameter utilized in the proposed scheme. The experimental result proves that proposed system provides the assurance to prolong the network lifespan and the probability of secure routing path in the network.


Routing Active Trust Security Black hole attack Selective forwarding attack CS algorithm 


  1. 1.
    Kellner, A., Alfandi, O., Alfandi, O., Hogrefe, D.: A survey on measures for secure routing in wireless sensor networks. Proc. Int. J. Sens. Netw. Data Commun. 1, 17 (2012)Google Scholar
  2. 2.
    Dewal, P., Narula, G.S., Jain, V.: Detection and prevention of black hole attacks in cluster based wireless sensor networks. In: Proceedings in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 3399–3403 (2016)Google Scholar
  3. 3.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings in the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, pp. 113–127 (2003)Google Scholar
  4. 4.
    Alajmi, N.M., Elleithy, K.: A new approach for detecting and monitoring of selective forwarding attack in wireless sensor networks. In: Proceedings in 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, pp. 1–6 (2016)Google Scholar
  5. 5.
    Pavan Kumar Guptha, Y., Madhu, M.: Improving security and detecting black hole attack in wireless sensor network. Int. J. Prof. Eng. Stud. 8(5), 260–265 (2017)Google Scholar
  6. 6.
    Momani, M., Challa, S.: Survey of trust models in different network domains. IJASUC 1(3), 1–19 (2010)CrossRefGoogle Scholar
  7. 7.
    Sathishkumar, R., Ramesh, C.: A modified method for preventing black-hole attack in mobile ad hoc networks. J. Eng. Appl. Sci. 11(2), 182–191 (2016)Google Scholar
  8. 8.
    Jain, A.: Trust based routing mechanism against black hole attack using AOMDV-IDS system in MANET format. Int. J. Emerg. Technol. Adv. Eng. 2(4), 653–661 (2012)Google Scholar
  9. 9.
    Chan, H., Perrg, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)CrossRefGoogle Scholar
  10. 10.
    Zhu, T., Zhong, Z., He, T., Zhang, Z.-L.: Energy synchronized computing for sustainable sensor networks. Ad Hoc Netw. 11(4), 1392–1404 (2013)CrossRefGoogle Scholar
  11. 11.
    Khan, W.Z., Yang, X., Aalsalem, M.Y., Arshada, Q.: The selective forwarding attack in sensor networks: detections and countermeasures. Int. J. Wirel. Microw. Technol. 2, 33–44 (2012)CrossRefGoogle Scholar
  12. 12.
    Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. In: Proceedings in Fourth International IEEE Conference on Computer Sciences and Convergence Information Technology, Seoul, South Korea, pp. 824–828 (2009)Google Scholar
  13. 13.
    Bin, T., Xian, Y.Y., Dong, L., Qi, L., Xin, Y.: A security framework for wireless sensor networks. J. Chin. Univ. Posts Telecommun. 17(Supplement 2), 118–122 (2010)Google Scholar
  14. 14.
    Latha, D., Palanivel, K.: Secure routing through trusted nodes in wireless sensor networks a survey. Proc. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 3(11), 3792–3799 (2014)Google Scholar
  15. 15.
    Liu, Y., Dong, M., Ota, K., Liu, A.: Active Trust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(9), 2013–2027 (2016)CrossRefGoogle Scholar
  16. 16.
    Das, S., Barani, S., Wagh, S., Sonavane, S.S.: Energy efficient and trustable routing protocol for wireless sensor networks based on genetic algorithm (E2TRP). In: Proceedings in IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, India, pp. 154–159 (2016)Google Scholar
  17. 17.
    Sharmila, S., Umamaheswari, G.: Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In: Proceedings in 2011 International Conference on Process Automation, Control and Computing, Coimbatore, India, pp. 1–6 (2011)Google Scholar
  18. 18.
    Geethu P.C., Mohammed, A.R.: Defense mechanism against selective forwarding attack in wire-less sensor networks. In: Proceedings in 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, pp. 1–4 (2013)Google Scholar
  19. 19.
    Motamedi, M., Yazdani, N.: Detection of black hole attack in wireless sensor network using uav. In: Proceedings in 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, Iran, pp. 1–5 (2015)Google Scholar
  20. 20.
    Kumar, R., Kumar, D.: Multi-objective fractional artificial bee colony algorithm to energy aware routing protocol in wireless sensor network. Wirel. Netw. 22(5), 1461–1474 (2016)CrossRefGoogle Scholar
  21. 21.
    Sanzgiri, K., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, Paris, France (2002)Google Scholar
  22. 22.
    Amir, H.G., Yang, X.-S., Amir, H.A.: Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems. Eng. Comput. 29(1), 17–35 (2013)CrossRefGoogle Scholar
  23. 23.
    Yang, X.-S., Deb, S.: Cuckoo search via Levy flights. In: Proceedings of the World Congress in Nature & Biologically Inspired Computing, Coimbatore, India, pp. 210–214 (2009)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Deepak C. Mehetre
    • 1
    Email author
  • S. Emalda Roslin
    • 1
  • Sanjeev J. Wagh
    • 2
  1. 1.Computer Science DepartmentSathyabama UniversityChennaiIndia
  2. 2.Information Technology Department, Govt. COEShivaji UniversityKaradIndia

Personalised recommendations