Black Hole Detection and Mitigation Using Active Trust in Wireless Sensor Networks

  • Venkata Abhishek KanthuruEmail author
  • Kakelli Anil Kumar
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 127)


The recent boom in wireless connectivity has seen a rapid deployment of wireless sensor networks (WSNs). This boom has led to new challenges in security due to the inherent resource and performance constraints in WSNs. The constraints mean that normal security models deployed on other types of networks are not feasible, and therefore a need for new models is present. One security issue present in these networks is the black hole attack. A black hole attack involves a malicious node, which tries to direct all traffic toward itself and drops all of it without forwarding it to the destination. To solve this issue, a hierarchical detection-based routing model is proposed, which along with the detection of black holes is also capable of actively re-routing the traffic during an attack to prevent any network downtime.


Black hole attack Wireless sensor networks Secure routing 


  1. 1.
    Taylor VF, Fokum DT (2014) Mitigating black hole attacks in wireless sensor networks using node-resident expert systems. In: Wireless telecommunications symposium, Washington, DC, pp 1–7.
  2. 2.
    Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inform Forens SecurGoogle Scholar
  3. 3.
    Taylor VF, Fokum DT (2014) Mitigating black hole attacks in wireless sensor networks using node-resident expert systems. In: Wireless telecommunications symposiumGoogle Scholar
  4. 4.
    Priayoheswari B, Kulothungan K, Kannan A (2017) A novel trust based routing protocol to prevent the malicious nodes in wireless sensor networks. In: Proceedings—2017 2nd international conference on recent trends and challenges in computational models (ICRTCCM 2017)Google Scholar
  5. 5.
    Shinde M, Mehetre DC (2018) Black hole and selective forwarding attack detection and prevention in WSN. In: 2017 international conference on computing, communication, control and automation (ICCUBEA 2017)Google Scholar
  6. 6.
    Mehetre DC, Roslin SE, Wagh SJ (2018) Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster ComputGoogle Scholar
  7. 7.
    Wazid M, Das AK (2017) A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks. Wireless Pers CommunGoogle Scholar
  8. 8.
    Ali S, Khan MA, Ahmad J, Malik AW, Ur Rehman A (2018) Detection and prevention of black hole attacks in IOT & WSN. In: 2018 3rd international conference on fog and mobile edge computing (FMEC 2018)Google Scholar
  9. 9.
    Kumar KA, Krishna AVN, Chatrapati KS (2017) New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks. J Inform Optim SciGoogle Scholar
  10. 10.
    Dhulipala VRS, Karthik N (2017) Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review. CSI Trans. ICTGoogle Scholar
  11. 11.
    Srivastava S, Singh M, Gupta S (2019) Wireless sensor network: a survey. In: 2018 international conference on automation and computational engineering (ICACE 2018)Google Scholar
  12. 12.
    Parganiha P, Kumar KA (2018) An energy-efficient clustering with hybrid coverage mechanism (EEC-HC) in wireless sensor network for precision agriculture. J Eng Sci Technol RevGoogle Scholar
  13. 13.
    Kim KT, Youn HY (2017) A dynamic level-based routing protocol for energy effciency in wireless sensor networks. J Internet TechnolGoogle Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  • Venkata Abhishek Kanthuru
    • 1
    Email author
  • Kakelli Anil Kumar
    • 1
  1. 1.Vellore Institute of TechnologyVelloreIndia

Personalised recommendations