Skip to main content

Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

Wireless sensor networks have millions of sensors, which cooperate with one on other in home automation, military surveillance, entity tracking systems and several other applications. In these networks, multicast is the basic routing service for efficient data broadcasting for task assignment, targeted queries and code updates. The sensor nodes have low computational capabilities, and are highly resource-constrained. So, the multicast routing protocols of wireless sensor networks are prone to various routing attacks, such as black hole, rushing, wormhole and denial of service attacks. The objective of this paper is to study the effects of the black hole and rushing attack on the location based Geographic multicast routing (GMR) protocol. The NS-2 based simulation is used in analyzing the black hole and rushing attacks on the GMR. The black hole and rushing attack degrades the network performance by 26% and 18% respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Prathapani, A., Santhanam, L., Agrawal, D.P.: Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. The Journal of Supercomputing, 1–28 (2010) (online First)

    Google Scholar 

  2. Krishnan, A., Manjunath, A., Reddy, G.J.: Retracted: A New Protocol to Secure AODV in Mobile AdHoc Networks. Communications in Computer and Information Science 133(5), 378–389 (2011)

    Article  Google Scholar 

  3. Sabbah, E., Kang, K.-D.: Security in Wireless Sensor Networks Computer Communications and Networks. In: Guide to WSN, 1st edn., pp. 491–512 (2009)

    Google Scholar 

  4. Zhan, G., Shi, W., Deng, J.: TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks. In: Silva, J.S., Krishnamachari, B., Boavida, F. (eds.) EWSN 2010. LNCS, vol. 5970, pp. 65–80. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  5. Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Journal on Adhoc Networks 6, 32–46 (2008)

    Article  Google Scholar 

  6. Hortelano, J., Calafate, C.T., Cano, J.C., de Leoni, M., Manzoni, P., Mecella, M.: Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6428, pp. 543–552. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  7. Lin, K., Lai, C.-F., Liu, X., Guan, X.: Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks, Mobile Networks and Applications, pp. 1–15 (2010) (online FirstTM)

    Google Scholar 

  8. Xing, K., Srinivasan, S.S.R., Jose, M., Rivera, M., Li, J., Cheng, X.: Attacks and Countermeasures in Sensor Networks: A Survey. Network Security, 251–272 (2010)

    Google Scholar 

  9. Xu, L., Deng, Z., Ren, W., Sch, H.W.: A Location Algorithm Integrating GPS and WSN in Pervasive Computing. Pervasive Computing and Applications, 461–466 (2008)

    Google Scholar 

  10. NS-2, http://www.isi.edu/nnam/ns/

  11. Kannhavong, P., Nakayama, H., Nemoto, Y., Kato, N.: A Survey of Routing Attacks In Mobile Ad Hoc Networks. IEEE Wireless Comm. 14, 85–91 (2007)

    Article  Google Scholar 

  12. Sanchez, Ruiz, J.A., Stojmnenovic, P.M.: GMR: Geographic Multicast Routing for Wireless Sensor Networks. Journal on Computer Comm., 2519–2531 (2007)

    Google Scholar 

  13. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Black hole Attack on AODV based Mobile Ad-hoc networks by Dynamic Learning Method. International Journal of Network Sec. 5, 338–346 (2007)

    Google Scholar 

  14. Shyamala, R., Valli, S.: Secure route discovery in MAODV for Wireless Sensor Networks. UbiCC Journal 4, 775–783 (2009)

    Google Scholar 

  15. Ramachandran, S., Shanmugan, V.: Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks. Journal of Computer Science 7, 973–979 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Shyamala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shyamala, R., Valli, S. (2012). Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics