BFO Based Optimized Positioning For Black Hole Attack Mitigation in WSN

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2014 by IJETT Journal
Volume-14 Number-1
Year of Publication : 2014
Authors : Manvi Arya , Er. Jatinder Pal Singh Raina
  10.14445/22315381/IJETT-V14P207

Citation 

Manvi Arya , Er. Jatinder Pal Singh Raina. "?BFO Based Optimized Positioning For Black Hole Attack Mitigation in WSN", International Journal of Engineering Trends and Technology (IJETT), V14(1),29-34 Aug 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Wireless Sensor networks are always susceptible to attacks by malicious behavior of external adversary which could negatively affect the secured routing and QoS and hence, vital wireless applications. In recent times, a lot of severe attacks have been proposed which make such networks highly vulnerable. One such attack is black hole attack that can be easily employed against routing in sensor networks. In this attack, a set of nodes in the network are being captured and reprogrammed by the external adversary so that these nodes do not transmit the data packets to the destination, which they generate or receive from other sensor nodes. In this paper, we propose an efficient technique that uses multiple base stations to be deployed randomly in the network to counter the impact of black holes on data transmission. Our simulation results show that our technique can achieve more than 99% packet delivery success using one or two base stations and also, the success rate increases with three or more base stations even if there is increase in the radius of the black hole region. The proposed scheme can be used to identify 100% black hole nodes with almost negligible false positives.

References

[1] I. Khalil, S. Bagchi, and C. Nina-Rotaru. DICAS: Detection, diagnosis and isolation of control attacks in sensor networks. In Proceedings of IEEE SECURECOMM, pages 89–100, 2005
[2] Z. Karakehayov. Using REWARD to detect team black-hole attacks in wireless sensor networks. In ACM Workshop on Real- World Wireless Sensor Networks, 2005.
[3] C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3):293–315, September 2003.
[4] I. Khalil, S. Bagchi, and C. Nina-Rotaru. DICAS: Detection, Diagnosis and isolation of control attacks in sensor networks. In Proceedings of IEEE SECURECOMM, pages 89–100, 2005.
[5] M. Tubaishat, J. Yin, B.Panja, and S. Madria, A Secure Hierarchical Model for Sensor Network, ACM SIGMOD Record, Vol. 33. No. 1, March 2004
[6] Mukesh Tiwari, Karm Veer Arya, Rahul Chaudhari, Kumar Sidharth Chhoudhary. Designing Intrusion Detection to detect Black hole and selective forwarding attack in WSN based on local information, 2009.
[7] H. Al Nahas, J. Deogun, and E. Manley. Proactive mitigation of impact of wormholes and sinkholes on routing security in Energy-efficient wireless sensor networks. Wireless Networks, 15(4):431–441, 2009.
[8] E. Ngai, J. Liu, and M. Lyu. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, pages 2353–2364, 2007.
[9] T. Shu, S. Liu, and M. Krunz. Secure data collection in wireless sensor networks using randomized dispersive routes. In IEEE INFOCOM, pages 2846–2850, 2009.
[10] Sheela.D, Srividhya. V.R, Asma Begam, Anjali and Chidanand , G.M. Detecting black hole attack in WSN using Mobile Agent.
[11] B. Xiao, B. Yu, and C. Gao. CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, pages 1218–1230, 2007.
[12] Satyajayant Misra, Kabi Bhattarai, and Guoliang Xue. BAMBi: Blackhole Attack Mitigation with Multiple Base Stations in Wireless Sensor Networks, 2011 IEEE.
[13] C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2–3), September 2003.
[14] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cyirci. Wireless sensor networks: A survey. Computer Networks, 38(4):393 – 422, 2002.
[15] Satish Salem Ramaswami and Shambhu Upadhyaya “Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing” 2006 IEEE.
[16] S. Didla, A. Ault, and S. Bagchi. Optimizing AES for Embedded devices and wireless sensor networks. In Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities (Trident), pages 1–10, 2008.
[17] S. Misra and G. Xue. Efficient anonymity schemes for clustered wireless sensor networks. Intl. Journal of Sensor Networks, 1(1):50–63, 2006.
[18] N.Bhalaji, Dr. A. Shanmugam “Association between nodes to combat blackhole attack in DSR based MANET,2009,IEEE.

Keywords
WSN, black hole attack, multiple base stations, successful data delivery, bacteria foraging optimization, false positives.