Abstract
Wireless sensor networks have millions of sensors, which cooperate with one on other in home automation, military surveillance, entity tracking systems and several other applications. In these networks, multicast is the basic routing service for efficient data broadcasting for task assignment, targeted queries and code updates. The sensor nodes have low computational capabilities, and are highly resource-constrained. So, the multicast routing protocols of wireless sensor networks are prone to various routing attacks, such as black hole, rushing, wormhole and denial of service attacks. The objective of this paper is to study the effects of the black hole and rushing attack on the location based Geographic multicast routing (GMR) protocol. The NS-2 based simulation is used in analyzing the black hole and rushing attacks on the GMR. The black hole and rushing attack degrades the network performance by 26% and 18% respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Prathapani, A., Santhanam, L., Agrawal, D.P.: Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. The Journal of Supercomputing, 1–28 (2010) (online First)
Krishnan, A., Manjunath, A., Reddy, G.J.: Retracted: A New Protocol to Secure AODV in Mobile AdHoc Networks. Communications in Computer and Information Science 133(5), 378–389 (2011)
Sabbah, E., Kang, K.-D.: Security in Wireless Sensor Networks Computer Communications and Networks. In: Guide to WSN, 1st edn., pp. 491–512 (2009)
Zhan, G., Shi, W., Deng, J.: TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks. In: Silva, J.S., Krishnamachari, B., Boavida, F. (eds.) EWSN 2010. LNCS, vol. 5970, pp. 65–80. Springer, Heidelberg (2010)
Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Journal on Adhoc Networks 6, 32–46 (2008)
Hortelano, J., Calafate, C.T., Cano, J.C., de Leoni, M., Manzoni, P., Mecella, M.: Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6428, pp. 543–552. Springer, Heidelberg (2010)
Lin, K., Lai, C.-F., Liu, X., Guan, X.: Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks, Mobile Networks and Applications, pp. 1–15 (2010) (online FirstTM)
Xing, K., Srinivasan, S.S.R., Jose, M., Rivera, M., Li, J., Cheng, X.: Attacks and Countermeasures in Sensor Networks: A Survey. Network Security, 251–272 (2010)
Xu, L., Deng, Z., Ren, W., Sch, H.W.: A Location Algorithm Integrating GPS and WSN in Pervasive Computing. Pervasive Computing and Applications, 461–466 (2008)
Kannhavong, P., Nakayama, H., Nemoto, Y., Kato, N.: A Survey of Routing Attacks In Mobile Ad Hoc Networks. IEEE Wireless Comm. 14, 85–91 (2007)
Sanchez, Ruiz, J.A., Stojmnenovic, P.M.: GMR: Geographic Multicast Routing for Wireless Sensor Networks. Journal on Computer Comm., 2519–2531 (2007)
Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Black hole Attack on AODV based Mobile Ad-hoc networks by Dynamic Learning Method. International Journal of Network Sec. 5, 338–346 (2007)
Shyamala, R., Valli, S.: Secure route discovery in MAODV for Wireless Sensor Networks. UbiCC Journal 4, 775–783 (2009)
Ramachandran, S., Shanmugan, V.: Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks. Journal of Computer Science 7, 973–979 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shyamala, R., Valli, S. (2012). Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)