SlideShare a Scribd company logo
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 4 (May 2014) http://ijirae.com
_____________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 167
BLACK HOLE ATTACKS MITIGATION AND
PREVENTION IN WIRELESS SENSOR NETWORK
Ms.B.R.Baviskar Mr.V.N.Patil
Dept. of E&Tc. PES’s M.C.O.E Dept. of E&Tc, PES’s M.C.O.E,
Pune, Maharashtra pune, Maharashtra,
Email id-bhagyashri.1424@gmail.com email id- vvnnpp2002@yahoo.com
ABSTRACT: Wireless Sensor Network consists of nodes which communicate with each other with wireless
channel. A general conception of wireless sensor network (WSN) nodes is static and it remains fixed in their
position. It has been deployed in dominant manner for a long period of time. Many researches mostly focus on
energy consumption in WSN sensor nodes. In WSN The security in wireless sensor networks (WSNs) is a critical
issue due to the inherent limitations of computational capacity and power usage The Black hole attacks is
one of the attack that challenges the security of WSN. Black hole attacks occur when an adversary cap-tures
and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of
forwarding them towards the base station. As a result any information that enters the black hole region is
captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by
partitioning the network, such that important event information do not reach the base stations. Several
techniques based on secret sharing and multi-path routing have been proposed in the literature to overcome
black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate, they
may even end up making black hole attacks more effective. Propose an efficient technique that uses multiple base
stations deployed in the network to counter the impact of black holes on data transmission, using java simulator
and performance compare with multiple base station and without multiple base station to prevent black hole
attacks. It implemented using Net bean IDE Java network simulator .
Keywords: Wireless sensor network, black hole, multiple base station.
I.INTRODUCTION
A WSN is composed of large number of sensor nodes which are distributed in the wireless environment.
This feature allows a random distribution of the nodes in the disaster relief operations or inaccessible
terrains and several other applications. The other applications of WSN includes environmental control such as
fire-fighting or marine ground floor erosion, also installing sensors on bridges or buildings to understand
earthquake vibration patterns, surveillance tasks of many kinds like intruder surveillance in premises, etc.
Due to the wireless nature and infrastructure-less environment of WSN, they are more vulnerable to many types of
security attacks. Generally, the attacks are of two types in WSN- active attacks and the passive attacks. Black-hole
attack is one of the harmful active attacks.
II. BLACK HOLE ATTACK
Black hole attacks are one such attacks in WSNs A black hole attack is an attack that is mounted by an external
adversary on a subset of the sensor nodes (SNs) in the network. The adversary captures these nodes and re-programs
them so that they do not transmit any data packets, namely the packets they generate and the packets from other SNs
that they are supposed to forward. These term re-programmed nodes as black hole nodes and the region containing
the black hole nodes as a black hole region.
Fig -1 Black hole attack in WSN
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 4 (May 2014) http://ijirae.com
_____________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 168
Fig. 1 to illustrate these terms. In the figure, the small circles filled in black are black hole nodes and the black hole
region is represented by red circle. When the source select the path including the attacker node, the traffic
starts passing through the adversary node and this nodes starts dropping the packets selectively or in whole.
Here, these re-programmed nodes are termed as black hole nodes and the region containing the black-hole
nodes are black hole region. Black hole region is the entry point to a large number of harmful attacks.
III. Multiple Base station
In a WSN, the requirement of successful packet delivery to the BS is more essential than the requirement of
prevention of data capture by an adversary. With the use of efficient data encryption algorithms, and data
anonymity techniques , the information that an adversary can derive from captured packet(s) can be made
inconsequential. Consequently, we concentrate on the objective of delivering the packet(s) to the BS in the presence
of black hole nodes. A novel solution that uses the placement of multiple BSs to improve the likelihood of packets
from the SNs reaching at least one BS in the network, thus ensuring high packet delivery success Use of multiple
base stations to handle the flow of large amounts of ,heterogeneous data from the network and several optimization
techniques have been designed for query allocation and base station placement . Here the use of multiple BSs is
proposed for improving data delivery in the presence of black hole attacks.
IV TECHNICAL DESCRIPTION
The system model and assumptions for our technique are as follows. The network consists of a set of randomly
deployed SNs, N={1...n}. The network consists of a set of BSs, B={B1,......, Bm}, which are more powerful
than SNs and are connected to a replenish able power source. The density of the WSN is high enough to
ensure adequate connectivity so that each SN can route data packets to all the BSs in the network. The BSs are
assumed to be connected to each other over a wired network. We assume that the SNs in the network can be
compromised by an external adversary and programmed to analyze the packets they receive and drop them
instead of forwarding them to the BSs. We refer to a compromised SN as a black hole node. The adversary is
capable of compromising more than one SN in the network, thus creating one or more black hole regions. In
addition, the compromised nodes are capable of colluding with other compromised nodes in their neighborhood
or in other black hole regions to analyze the captured packets. We assume that the SNs in the black hole region
do not perform their environment sensing tasks as they are compromised.
V. RESULT AND DISCUSSION
The AODV protocols are simulated using Net Beans java network simulator software to activate network . The
performance of using AODV protocols are compared with and without multiple based station on various
network parameters.
Fig 2 Output False & success Black Hole Attack by using one base station
For needed to save energy in WSN, initially routing path done through nearest base station i.e without using
multiple base station .Routing through multiple base station is activated only when there is chance of black hole
attack. By using encryption algorithm. To check presence of black hole nodes.
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163
Volume 1 Issue 4 (May 2014) http://ijirae.com
_____________________________________________________________________________________________
© 2014, IJIRAE- All Rights Reserved Page - 169
Fig 3 Output False & success Black Hole Attack by using multiple base station.
VI.CONCLUSION
Multiple base station technique to effectively mitigate the adverse effect of black hole attack in WSN. The
detection of abnormal behavior of certain nodes is followed upon which the data transmission to multiple base
stations is triggered. For this purpose we make use of encryption algorithm, which keep visiting the stationary nodes
to detect any abnormality in the presence of black holes. These solution is highly effective and require little
computation and message exchanges in network, thus saving energy of the SN.
REFERENCES
1 satyajayant Misr,Kabi Bhattarai.“Hole attack mitigation with Multiple base station in Wireless sensor network ”.
2011
2. “Detecting Black Hole attacks in Wireless sensor network using Mobile agent.”by Sheel D,Asma Begam
2012
3. Thamil salvi C.P “ Novel method to detect black hole inWSN” .“ International Journal of Computer Applications
(0975 – 8887) Volume 45– No.17, May 2012 .
4. Pooja Kumari,Mukesh Kumar, Rahul Rishi, .“Study of Security in Wireless Sensor Networ International Journal
of Computer Science and Information Technologies, Vol. 1 (5) , 2010.
5. Parul Kansal ,depali kansal“ compression of various routing protocol in wireless sensor network ”,
International Journal of Computer Technologies, Vol. 1 (5) no-11, 2010.
6. Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher “Challenges for Security in Wireless sensor network”
International Journal of Computer Science and Information Technologies. vol.2,s5 2011
7. Z. Karakehayov. Using REWARD to detect team black-hole attacks in wireless sensor networks.In ACM
Workshop on Real-World Wireless Sensor Networks , 2005.
8. W. Lou and Y. Kwon. H-SPREAD: A hybrid multipath scheme for secure and reliable data collecti on in
wireless sensor networks. IEEE Transactions on Vehicular Technology , 55(4):1320–1330, 2006.

More Related Content

What's hot (20)

PDF
A Survey on Threats and Security schemes in Wireless Sensor Networks
IJERA Editor
 
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
PDF
security in wireless sensor networks
researcherchennai
 
PDF
C0363012014
inventionjournals
 
PDF
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
PDF
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
PDF
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
IJMTST Journal
 
PDF
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
eSAT Publishing House
 
PDF
N0704075079
IJERD Editor
 
PDF
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
PDF
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
IOSR Journals
 
PDF
A Study on Security in Wireless Sensor Networks
ijtsrd
 
PDF
A key management approach for wireless sensor networks
Zac Darcy
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
Tqds time stamped quantum digital signature to defend
eSAT Publishing House
 
PDF
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
IJNSA Journal
 
PDF
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
PDF
Public encryption with two ack approach to mitigate wormhole attack in wsn
eSAT Journals
 
PDF
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
IJERA Editor
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
security in wireless sensor networks
researcherchennai
 
C0363012014
inventionjournals
 
Investigation of detection & prevention sinkhole attack in manet
ijctet
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
IJMTST Journal
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
IJMTST Journal
 
Malicious attack detection and prevention in ad hoc network based on real tim...
eSAT Publishing House
 
N0704075079
IJERD Editor
 
Source location privacy in wireless sensor networks using data mules.
Rahul Kumar
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
IOSR Journals
 
A Study on Security in Wireless Sensor Networks
ijtsrd
 
A key management approach for wireless sensor networks
Zac Darcy
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Tqds time stamped quantum digital signature to defend
eSAT Publishing House
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
IJNSA Journal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
eSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Viewers also liked (10)

PPTX
[Pgp30380]_BM_Sec B_p2
Sameer Mathur
 
PDF
Load Balancing for Achieving the Network Lifetime in WSN-A Survey
AM Publications
 
PDF
Enhanced ID3 algorithm based on the weightage of the Attribute
AM Publications
 
PDF
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
AM Publications
 
PDF
A Triple Band Notched Reconfigurable Micro strip Fed UWB Applications Antenna
AM Publications
 
PDF
Improving the Performance of Mapping based on Availability- Alert Algorithm U...
AM Publications
 
PPT
усинабиль+кулинары+туристы
Абиль Усин
 
PPTX
Time Management-2015
Jessica Wright, MBA, EIT
 
PDF
pandeo
Raysa Alfaro
 
PDF
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...
AM Publications
 
[Pgp30380]_BM_Sec B_p2
Sameer Mathur
 
Load Balancing for Achieving the Network Lifetime in WSN-A Survey
AM Publications
 
Enhanced ID3 algorithm based on the weightage of the Attribute
AM Publications
 
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
AM Publications
 
A Triple Band Notched Reconfigurable Micro strip Fed UWB Applications Antenna
AM Publications
 
Improving the Performance of Mapping based on Availability- Alert Algorithm U...
AM Publications
 
усинабиль+кулинары+туристы
Абиль Усин
 
Time Management-2015
Jessica Wright, MBA, EIT
 
pandeo
Raysa Alfaro
 
To Design and Develop a Quarter-Circle Shaped Patch Antenna with Triple Notch...
AM Publications
 
Ad

Similar to BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK (20)

PDF
E0392031034
ijceronline
 
PDF
Detection and removal of multiple black hole attacks through sending forged p...
IRJET Journal
 
PDF
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
PDF
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 
DOCX
A detection & prevention of wormhole attack in wsn project abstract
vishnuRajan20
 
PDF
A two tier approach for preventing black hole attack and improving efficiency
eSAT Journals
 
PDF
Secure dynamic source routing protocol for defending black hole attacks in mo...
nooriasukmaningtyas
 
PDF
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
IRJET Journal
 
PDF
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
IJARIIE JOURNAL
 
PDF
K1803036872
IOSR Journals
 
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
ijsrd.com
 
PDF
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
PPTX
Analysis and reactive measures on the blackhole attack
JyotiVERMA176
 
PDF
D0961927
IOSR Journals
 
PDF
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
dbpublications
 
PDF
A new ids scheme against blackhole attack to enhance security in wireless net...
eSAT Journals
 
PDF
Simulation Based Study of Cooperative Black Hole Attack Resolution using Cros...
pijans
 
PDF
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
pijans
 
PPTX
Black hole attack
Richa Kumari
 
PDF
Q01813104114
IOSR Journals
 
E0392031034
ijceronline
 
Detection and removal of multiple black hole attacks through sending forged p...
IRJET Journal
 
Proposed Agent Based Black hole Node Detection Algorithm for Ad-Hoc Wireless...
ijcsa
 
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
IJCSIS Research Publications
 
A detection & prevention of wormhole attack in wsn project abstract
vishnuRajan20
 
A two tier approach for preventing black hole attack and improving efficiency
eSAT Journals
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
nooriasukmaningtyas
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
IRJET Journal
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
IJARIIE JOURNAL
 
K1803036872
IOSR Journals
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
ijsrd.com
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
IJCNC
 
Analysis and reactive measures on the blackhole attack
JyotiVERMA176
 
D0961927
IOSR Journals
 
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey
dbpublications
 
A new ids scheme against blackhole attack to enhance security in wireless net...
eSAT Journals
 
Simulation Based Study of Cooperative Black Hole Attack Resolution using Cros...
pijans
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
pijans
 
Black hole attack
Richa Kumari
 
Q01813104114
IOSR Journals
 
Ad

More from AM Publications (20)

PDF
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
PDF
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
PDF
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
PDF
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
PDF
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
PDF
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
PDF
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
PDF
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
PDF
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PDF
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
PDF
INTELLIGENT BLIND STICK
AM Publications
 
PDF
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
PDF
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
PDF
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
PDF
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
PDF
DETECTION OF MOVING OBJECT
AM Publications
 
PDF
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PDF
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
PDF
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
PDF
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 
DEVELOPMENT OF TODDLER FAMILY CADRE TRAINING BASED ON ANDROID APPLICATIONS IN...
AM Publications
 
TESTING OF COMPOSITE ON DROP-WEIGHT IMPACT TESTING AND DAMAGE IDENTIFICATION ...
AM Publications
 
THE USE OF FRACTAL GEOMETRY IN TILING MOTIF DESIGN
AM Publications
 
TWO-DIMENSIONAL INVERSION FINITE ELEMENT MODELING OF MAGNETOTELLURIC DATA: CA...
AM Publications
 
USING THE GENETIC ALGORITHM TO OPTIMIZE LASER WELDING PARAMETERS FOR MARTENSI...
AM Publications
 
ANALYSIS AND DESIGN E-MARKETPLACE FOR MICRO, SMALL AND MEDIUM ENTERPRISES
AM Publications
 
REMOTE SENSING AND GEOGRAPHIC INFORMATION SYSTEMS
AM Publications
 
EVALUATE THE STRAIN ENERGY ERROR FOR THE LASER WELD BY THE H-REFINEMENT OF TH...
AM Publications
 
HMM APPLICATION IN ISOLATED WORD SPEECH RECOGNITION
AM Publications
 
PEDESTRIAN DETECTION IN LOW RESOLUTION VIDEOS USING A MULTI-FRAME HOG-BASED D...
AM Publications
 
INTELLIGENT BLIND STICK
AM Publications
 
EFFECT OF SILICON - RUBBER (SR) SHEETS AS AN ALTERNATIVE FILTER ON HIGH AND L...
AM Publications
 
UTILIZATION OF IMMUNIZATION SERVICES AMONG CHILDREN UNDER FIVE YEARS OF AGE I...
AM Publications
 
REPRESENTATION OF THE BLOCK DATA ENCRYPTION ALGORITHM IN AN ANALYTICAL FORM F...
AM Publications
 
OPTICAL CHARACTER RECOGNITION USING RBFNN
AM Publications
 
DETECTION OF MOVING OBJECT
AM Publications
 
SIMULATION OF ATMOSPHERIC POLLUTANTS DISPERSION IN AN URBAN ENVIRONMENT
AM Publications
 
PREPARATION AND EVALUATION OF WOOL KERATIN BASED CHITOSAN NANOFIBERS FOR AIR ...
AM Publications
 
ANALYSIS ON LOAD BALANCING ALGORITHMS IMPLEMENTATION ON CLOUD COMPUTING ENVIR...
AM Publications
 
A MODEL BASED APPROACH FOR IMPLEMENTING WLAN SECURITY
AM Publications
 

Recently uploaded (20)

PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
PDF
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PPTX
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
PPTX
cybersecurityandthe importance of the that
JayachanduHNJc
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
SG1-ALM-MS-EL-30-0008 (00) MS - Isolators and disconnecting switches.pdf
djiceramil
 
2025 Laurence Sigler - Advancing Decision Support. Content Management Ecommer...
Francisco Javier Mora Serrano
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
Jual GPS Geodetik CHCNAV i93 IMU-RTK Lanjutan dengan Survei Visual
Budi Minds
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
ENSA_Module_7.pptx_wide_area_network_concepts
RanaMukherjee24
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Air -Powered Car PPT by ER. SHRESTH SUDHIR KOKNE.pdf
SHRESTHKOKNE
 
cybersecurityandthe importance of the that
JayachanduHNJc
 
Information Retrieval and Extraction - Module 7
premSankar19
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
Introduction to Fluid and Thermal Engineering
Avesahemad Husainy
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Basics of Auto Computer Aided Drafting .pptx
Krunal Thanki
 

BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK

  • 1. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 4 (May 2014) http://ijirae.com _____________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 167 BLACK HOLE ATTACKS MITIGATION AND PREVENTION IN WIRELESS SENSOR NETWORK Ms.B.R.Baviskar Mr.V.N.Patil Dept. of E&Tc. PES’s M.C.O.E Dept. of E&Tc, PES’s M.C.O.E, Pune, Maharashtra pune, Maharashtra, Email [email protected] email id- [email protected] ABSTRACT: Wireless Sensor Network consists of nodes which communicate with each other with wireless channel. A general conception of wireless sensor network (WSN) nodes is static and it remains fixed in their position. It has been deployed in dominant manner for a long period of time. Many researches mostly focus on energy consumption in WSN sensor nodes. In WSN The security in wireless sensor networks (WSNs) is a critical issue due to the inherent limitations of computational capacity and power usage The Black hole attacks is one of the attack that challenges the security of WSN. Black hole attacks occur when an adversary cap-tures and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of forwarding them towards the base station. As a result any information that enters the black hole region is captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by partitioning the network, such that important event information do not reach the base stations. Several techniques based on secret sharing and multi-path routing have been proposed in the literature to overcome black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate, they may even end up making black hole attacks more effective. Propose an efficient technique that uses multiple base stations deployed in the network to counter the impact of black holes on data transmission, using java simulator and performance compare with multiple base station and without multiple base station to prevent black hole attacks. It implemented using Net bean IDE Java network simulator . Keywords: Wireless sensor network, black hole, multiple base station. I.INTRODUCTION A WSN is composed of large number of sensor nodes which are distributed in the wireless environment. This feature allows a random distribution of the nodes in the disaster relief operations or inaccessible terrains and several other applications. The other applications of WSN includes environmental control such as fire-fighting or marine ground floor erosion, also installing sensors on bridges or buildings to understand earthquake vibration patterns, surveillance tasks of many kinds like intruder surveillance in premises, etc. Due to the wireless nature and infrastructure-less environment of WSN, they are more vulnerable to many types of security attacks. Generally, the attacks are of two types in WSN- active attacks and the passive attacks. Black-hole attack is one of the harmful active attacks. II. BLACK HOLE ATTACK Black hole attacks are one such attacks in WSNs A black hole attack is an attack that is mounted by an external adversary on a subset of the sensor nodes (SNs) in the network. The adversary captures these nodes and re-programs them so that they do not transmit any data packets, namely the packets they generate and the packets from other SNs that they are supposed to forward. These term re-programmed nodes as black hole nodes and the region containing the black hole nodes as a black hole region. Fig -1 Black hole attack in WSN
  • 2. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 4 (May 2014) http://ijirae.com _____________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 168 Fig. 1 to illustrate these terms. In the figure, the small circles filled in black are black hole nodes and the black hole region is represented by red circle. When the source select the path including the attacker node, the traffic starts passing through the adversary node and this nodes starts dropping the packets selectively or in whole. Here, these re-programmed nodes are termed as black hole nodes and the region containing the black-hole nodes are black hole region. Black hole region is the entry point to a large number of harmful attacks. III. Multiple Base station In a WSN, the requirement of successful packet delivery to the BS is more essential than the requirement of prevention of data capture by an adversary. With the use of efficient data encryption algorithms, and data anonymity techniques , the information that an adversary can derive from captured packet(s) can be made inconsequential. Consequently, we concentrate on the objective of delivering the packet(s) to the BS in the presence of black hole nodes. A novel solution that uses the placement of multiple BSs to improve the likelihood of packets from the SNs reaching at least one BS in the network, thus ensuring high packet delivery success Use of multiple base stations to handle the flow of large amounts of ,heterogeneous data from the network and several optimization techniques have been designed for query allocation and base station placement . Here the use of multiple BSs is proposed for improving data delivery in the presence of black hole attacks. IV TECHNICAL DESCRIPTION The system model and assumptions for our technique are as follows. The network consists of a set of randomly deployed SNs, N={1...n}. The network consists of a set of BSs, B={B1,......, Bm}, which are more powerful than SNs and are connected to a replenish able power source. The density of the WSN is high enough to ensure adequate connectivity so that each SN can route data packets to all the BSs in the network. The BSs are assumed to be connected to each other over a wired network. We assume that the SNs in the network can be compromised by an external adversary and programmed to analyze the packets they receive and drop them instead of forwarding them to the BSs. We refer to a compromised SN as a black hole node. The adversary is capable of compromising more than one SN in the network, thus creating one or more black hole regions. In addition, the compromised nodes are capable of colluding with other compromised nodes in their neighborhood or in other black hole regions to analyze the captured packets. We assume that the SNs in the black hole region do not perform their environment sensing tasks as they are compromised. V. RESULT AND DISCUSSION The AODV protocols are simulated using Net Beans java network simulator software to activate network . The performance of using AODV protocols are compared with and without multiple based station on various network parameters. Fig 2 Output False & success Black Hole Attack by using one base station For needed to save energy in WSN, initially routing path done through nearest base station i.e without using multiple base station .Routing through multiple base station is activated only when there is chance of black hole attack. By using encryption algorithm. To check presence of black hole nodes.
  • 3. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 4 (May 2014) http://ijirae.com _____________________________________________________________________________________________ © 2014, IJIRAE- All Rights Reserved Page - 169 Fig 3 Output False & success Black Hole Attack by using multiple base station. VI.CONCLUSION Multiple base station technique to effectively mitigate the adverse effect of black hole attack in WSN. The detection of abnormal behavior of certain nodes is followed upon which the data transmission to multiple base stations is triggered. For this purpose we make use of encryption algorithm, which keep visiting the stationary nodes to detect any abnormality in the presence of black holes. These solution is highly effective and require little computation and message exchanges in network, thus saving energy of the SN. REFERENCES 1 satyajayant Misr,Kabi Bhattarai.“Hole attack mitigation with Multiple base station in Wireless sensor network ”. 2011 2. “Detecting Black Hole attacks in Wireless sensor network using Mobile agent.”by Sheel D,Asma Begam 2012 3. Thamil salvi C.P “ Novel method to detect black hole inWSN” .“ International Journal of Computer Applications (0975 – 8887) Volume 45– No.17, May 2012 . 4. Pooja Kumari,Mukesh Kumar, Rahul Rishi, .“Study of Security in Wireless Sensor Networ International Journal of Computer Science and Information Technologies, Vol. 1 (5) , 2010. 5. Parul Kansal ,depali kansal“ compression of various routing protocol in wireless sensor network ”, International Journal of Computer Technologies, Vol. 1 (5) no-11, 2010. 6. Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher “Challenges for Security in Wireless sensor network” International Journal of Computer Science and Information Technologies. vol.2,s5 2011 7. Z. Karakehayov. Using REWARD to detect team black-hole attacks in wireless sensor networks.In ACM Workshop on Real-World Wireless Sensor Networks , 2005. 8. W. Lou and Y. Kwon. H-SPREAD: A hybrid multipath scheme for secure and reliable data collecti on in wireless sensor networks. IEEE Transactions on Vehicular Technology , 55(4):1320–1330, 2006.