Identification and Mitigation of Black Hole Attack in Wireless Sensor Networks

Harpreet Kaur, Amarvir Singh
{"title":"Identification and Mitigation of Black Hole Attack in Wireless Sensor Networks","authors":"Harpreet Kaur, Amarvir Singh","doi":"10.1109/ICMETE.2016.66","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are made up of many inexpensive nodes geographically distributed over a certain area where the sensor node components include sensors, actuators, processing unit and storage, location tracking and power supply unit. These types of networks have large range of applications that include environmental pollution, vehicle and building safety etc. In sensor networks, the nodes are tiny in size, cheap and light weighted with narrow computing capability and often deployed in inaccessible areas where securing these kinds of networks usually leads towards the complexity. This issue of complexity made sensor networks more prone to the diverse security attacks, in which black hole attack or packet drop attack which is quite common and harmful attack that affects the network layer. In black hole attack the adversary controls the sensor node and drops the entire set of packets that are forwarded to it. In this research, the technique of knowledge based learning is used for detection and mitigation of those harmful nodes from the network responsible for activating the attack. For simulation, network simulator NS2 is used under Ubuntu 12.0.4 OS.","PeriodicalId":167368,"journal":{"name":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMETE.2016.66","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Wireless sensor networks are made up of many inexpensive nodes geographically distributed over a certain area where the sensor node components include sensors, actuators, processing unit and storage, location tracking and power supply unit. These types of networks have large range of applications that include environmental pollution, vehicle and building safety etc. In sensor networks, the nodes are tiny in size, cheap and light weighted with narrow computing capability and often deployed in inaccessible areas where securing these kinds of networks usually leads towards the complexity. This issue of complexity made sensor networks more prone to the diverse security attacks, in which black hole attack or packet drop attack which is quite common and harmful attack that affects the network layer. In black hole attack the adversary controls the sensor node and drops the entire set of packets that are forwarded to it. In this research, the technique of knowledge based learning is used for detection and mitigation of those harmful nodes from the network responsible for activating the attack. For simulation, network simulator NS2 is used under Ubuntu 12.0.4 OS.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线传感器网络中黑洞攻击的识别与缓解
无线传感器网络由地理上分布在一定区域上的许多廉价节点组成,其中传感器节点组件包括传感器、执行器、处理单元和存储、位置跟踪和供电单元。这些类型的网络具有广泛的应用范围,包括环境污染,车辆和建筑安全等。在传感器网络中,节点体积小,价格便宜,重量轻,计算能力有限,通常部署在难以进入的区域,在这些区域,保护这些类型的网络通常会导致复杂性。这种复杂性使得传感器网络更容易受到各种各样的安全攻击,其中黑洞攻击和丢包攻击是比较常见的危害网络层的攻击。在黑洞攻击中,对手控制传感器节点并丢弃转发给它的整个数据包集。在本研究中,使用基于知识的学习技术来检测和缓解网络中负责激活攻击的有害节点。在Ubuntu 12.0.4操作系统下使用网络模拟器NS2进行仿真。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Study of E-shaped Patch Antenna with Two Rectangular Slots Text Summarization of Hindi Documents Using Rule Based Approach Estimation of Respiratory Rate from the ECG Using Instantaneous Frequency Tracking FxLMS Algorithm Low Power and High Performance Ring Counter Using Pulsed Latch Technique Satellite Image Enhancement using Discrete Wavelet Transform, Singular Value Decomposition and its Noise Performance Analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1