Effect of Black Hole Attacks on Wireless Sensor Networks

Sachin Lalar, . Monika, Arun Kumar Yadav


Wireless sensor networks (WSNs) establish a new popular of ambient supervision with many latent packages. The environment of wireless sensor networks prone to different forms of attacks as networks are prepared in open and unsecured surroundings. This paper analyses the overall performance of AODV whilst attacked by black hole, through varying the mobility of the nodes within the community. The overall performance metrics which can be used to do the analysis are LPR, packet delivery ratio & Packet loss. The simulation consequences display that the overall performance of each AODV degrades in the presence of black hole attack.

Full Text:



Wang, Qinghua, and Ilangko Balasingham, "Wireless sensor networks-an introduction." Chapter 1 (2010): 1-16.

Raghavendra, Cauligi S., Krishna M. Sivalingam, and Taieb Znati, eds. Wireless sensor networks. Springer, 2004.

C. E. Perkins, E. M. B. Royer and S. R. Das, ―Ad-hoc On-Demand Distance Vector (AODV) Routing,‖ Mobile Ad-hoc Networking Working Group, Internet Draft, draft-ietf-manetaodv- 00.txt, Feb. 2003

Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong, “ Security in Wireless Sensor Networks: Issues and Challenges”, Feb 20-22, 2006

Adrian Perrig, John Stankovic, David Wagner.,” Security in wireless sensor networks”, communications of the ACM, vol 47,no. 6, pp 53-57, June 2004

Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou “Sensor Network Security: A Survey” IEEE Communications Surveys & Tutorials, Vol. 11, No. 2, Second Quarter 2009

John Paul Walters., Zhengiang Liang, Weisong Shi and Vipin Chaudhary., “Wireless sensor network Security : A Survey”, Chapter 17, Security in distributed grid and pervasive computing ,2001

Manny Rivera, Jiang Li, Xiuzhen Cheng, “Attacks and Countermeasures in Sensor Networks: A Survey” ,2005

M. Al-Shurman, S-M. Yoo, and S. Park, “Black Hole Attack in Mobile Ad-Hoc Networks,” ACM Southeast Regional Conf. 2004.

The Network Simulator - ns-2 available at: http://www.isi.edu/nsnam/ns

DOI: https://doi.org/10.23956/ijarcsse/V7I7/0189


  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.