Improving Security and Packet Delivery against Black Hole Attacks with Multiple Base Station in Wireless Sensor Network
Abstract
Wireless sensor network (WSN) is comprised of a
large number of sensors that collaboratively monitor various
environments which sense and forward temperature, humidity,
etc. In WSN, Black hole attack is occurred when adversary
or intermediary captures the node they do not transmit data
to next node instead of that they transmit wrong/false event
information to the base station. Literature study has been
proved the 100attack and 99in presence of black hole attack
by allowing packet transmission to other base station where
base stations are deployed at various places. Our focus is on
successful data delivery at multiple base stations. In this paper
we have been proved the 100station by implementing lightweight
security model. We analyze Tiny Encryption Algorithm from
literature survey which deals with authentication, encryption and
decryption yields feasible solution for wireless sensor networks.
Full Text:
PDFReferences
Satyajayant Misra, Kabi Bhattarai and Guoliang Xue, BAMBi: Blackhole
attacks mitigation with multiple base stations in wireless sensor networks,
publication in the IEEE ICC 2011 proceedings.
Z. Karakehayov. Using REWARD to detect team black-hole attacks in
wireless sensor networks, In ACM Workshop on Real- World Wireless
Sensor Networks, 2005.
B.J. Culpepper, H.C. Tseng, Sink hole intrusion indicators in DSR
MANETs, Proceeding of International Conference Broad Band Networks.
PP, 681-688, 2004.
T. Shu, S. Liu, and M. Krunz. Secure data collection in wireless sensor
networks using randomized dispersive routes. In IEEE INFOCOM, pages
, 2009.
C. Karlof and D. Wagner. Secure routing in wireless sensor networks:
Attacks and countermeasures. Elseviers Ad Hoc Networks Journal, Special
Issue on Sensor Network Applications and Protocols, 1(2 3):293315,
September 2003.
S. Roy, S. Singh, S. Choudhary, and N. Debnath. Countering sinkhole and
black hole attacks on sensor networks using dynamic trust management.
In IEEE Symposium on Computers and Communications, pages 537542,
Elias Yarrkov, Cryptanalysis of XXTEA May 4, 2010.
Sadaqat Ur Rehman et al., Comparison Based Analysis of Different
Cryptographic and Encryption Techniques Using Message Authentication
Code(MAC) in Wireless Sensor Networks (WSN), IJCSI International
Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, ISSN (Online):
-0814, Jan 2012.
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless
sensor networks: A survey, Computer Networks, 38(4):393422, 2002.
R. M. Needham, D.J. Wheeler, Correction to xtea, Computer
Laboratory, University of Cambridge, October98, available at
http://www.movabletype.co.uk/scripts/xxtea.pdf, 1998.
Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradford Implementing
the TEA algorithm on Sensors ACMSE 04, April 23, 2004, Huntsville,
Alabama USACopyright 2004 ACM 158113870-9/04/04.
Jongdeog Lee, Krasimira Kapitanova, Sang H. Son The price of
security in wireless sensor networks, Computer Network (2010),
doi:10.1016/j.comnet.2010.05.011,www.elsevier.com/locate/comn et,
Devesh Jinwala, Dhiren Patel, Kankar Dasgupta, Optimizing the block
cipher and modes of operations overhead at the link layer security
framework in the wireless sensor networks, in: ICISS, pp. 258272, 2008.
Mohan C Nikam, B. K. Mishra, Prashant Lakkadwala 2014, Security
against Black Hole Attack in Wireless Sensor Network - A Review, In
Proceedings of the 2014 Fourth international Conference on Communication
Systems and Network Technologies (April 07 - 09, 2014), IEEE
Computer Society, Washington, DC, 615-620.
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology