Skip to main content

Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks

  • Conference paper
  • First Online:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (ISDDC 2017)

Abstract

In recent past Wireless Sensor Network has emerged as a promising technology and has proved to be a leading motivational force for a new innovation namely Internet of Things. Due to characteristics constraints, security is one of key challenge to sustain the performance of wireless sensor networks. Blackhole attack is a major threat for Wireless Sensor Network in which an intruder absorbs the traffic intended for base station by introducing a malicious node. In this paper a new technique is proposed to detect and prevent blackhole attack in Wireless Sensor Network. The simulation results obtained with the proposed technique establishes that in the event of blackhole attack the malicious node is successfully detected and usage of proposed technique prevents the deterioration in the performance of Wireless Sensor Network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Martins, D., Guyennet, H.: Wireless sensor network attacks and security mechanisms: a short survey. In: 13th International Conference on Network-Based Information Systems (2010)

    Google Scholar 

  2. Antoine-Santoni, T., Santucci, J.F., Gentili, E.D., Costa, B.: Using wireless sensor network for wildfire detection: a discrete event approach of environmental monitoring tool. In: First International Symposium on Environment Identities and Mediterranean Area, Corte-Ajaccio, France (2006)

    Google Scholar 

  3. Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. IEEE Wireless Commun. 11, 6–28 (2004)

    Article  Google Scholar 

  4. Singh, H., Singh, D.: Taxonomy of routing protocols in wireless sensor networks: a survey. In: IEEE 2nd International Conference on Contemporary Computing and Informatics, Noida, India, pp. 822–830 (2016)

    Google Scholar 

  5. Ahmed, A., Bakar, K.A., Channa, M.I., Haseeb, K., Khan, A.W.: A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers Comput. Sci. 9, 280–296 (2015)

    Article  MathSciNet  Google Scholar 

  6. Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad-hoc networks. IEEE Commun. Mag. 40, 70–75 (2002)

    Article  Google Scholar 

  7. Gao, H., Wu, R., Cao, M., Zhang, C.: Detection and defense technology of blackhole attacks in wireless sensor network. In: Sun, X., Qu, W., Stojmenovic, I., Zhou, W., Li, Z., Guo, H., Min, G., Yang, T., Wu, Y., Liu, L. (eds.) ICA3PP 2014. LNCS, vol. 8631, pp. 601–610. Springer, Cham (2014). doi:10.1007/978-3-319-11194-0_53

    Google Scholar 

  8. Hu, Y.C., Perrig, A.: Survey of secure wireless ad hoc routing. IEEE Secur. Priv. 2, 28–39 (2004)

    Google Scholar 

  9. Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24, 370–380 (2006)

    Article  Google Scholar 

  10. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Commun. 14, 85–91 (2007)

    Article  Google Scholar 

  11. Lal, C., Shrivastava, A.: An energy preserving detection mechanism for blackhole attack in wireless sensor networks. Int. J. Comput. Appl. 115, 32–37 (2015)

    Google Scholar 

  12. Prathapani, A., Santhanam, L., Agrawal, D.P.: Intelligent honeypot agent for blackhole attack detection in wireless mesh networks. In: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, China (2009)

    Google Scholar 

  13. Misra, S., Bhattarai, K., Xue, G.: BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. In: IEEE International Conference on Communications (ICC), Kyoto, Japan (2011)

    Google Scholar 

  14. Sheela, D., Srividhya, V.R., Begam, A., Anjali, Chidanand, G.M.: Detecting black hole attacks in wireless sensor networks using mobile agent. In: International Conference on Artificial Intelligence and Embedded Systems (ICAIES 2012), Singapore (2012)

    Google Scholar 

  15. Jian, Y., Madria, S.K.: A hierarchical secure routing protocol against black hole attacks in sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), Taichung, Taiwan (2006)

    Google Scholar 

  16. Tripathi, M., Gaur, M.S., Laxmi, V., Sharma, P.: Detection and countermeasure of node misbehaviour in clustered wireless sensor network. ISRN Sen. Netw. 2013, 1–9 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gurjinder Kaur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Kaur, G., Jain, V.K., Chaba, Y. (2017). Detection and Prevention of Blackhole Attacks in Wireless Sensor Networks. In: Traore, I., Woungang, I., Awad, A. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2017. Lecture Notes in Computer Science(), vol 10618. Springer, Cham. https://doi.org/10.1007/978-3-319-69155-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69155-8_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69154-1

  • Online ISBN: 978-3-319-69155-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics