Detection and Isolation Technique for Blackhole Attack in Wireless Sensor Network

Mandeep Thakur, Amninder Kaur Gill


A wireless sensor network comprises of countless spread over a particular territory where we need to take care of at the progressions going ahead there. A sensor hub, for the most part, comprises of sensors, actuators, memory, a processor and they do have correspondence capacity. These sorts of networks are much powerless against security attacks. Many kinds of active and passive attacks are conceivable in the sensor network. Among all the conceivable active attacks, sinkhole attack is the most widely recognized and destructive attack. This attack debases network execution and prompts denial of service attack. The attack is triggered by the malicious hub which is available in the network. In this work, a novel strategy has been proposed to recognize and disengage malicious nodes from the network which are in charge of triggering the attack. The novel procedure is based on blacklist technique and clustering technique. The exploratory results will demonstrate that proposed strategy detects and separate the malicious nodes from the network proficiently. It will enhance network effectiveness as far as bundle misfortune, defer and expand throughput of the network. NS2 simulator instrument will be utilized as a part of it.

Full Text:



Juby Joseph, Vinodh P Vijayan,” Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression using Longer Path Protocol”, 2014 Vol.4

Dr. G. Padmavathi, Mrs. D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009, pp. 1-9

Ju young Kim, Ronnie D. Caytiles, Kyung Jung Kim, “A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks” Journal of Security Engineering, 2014, pp.241-250

Kalpana Sharma and M K Ghose, “Wireless Sensor Networks: An Overview on its Security Threats” IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010, pp.42-45

Kalpana Sharma and M K Ghose, “Wireless Sensor Networks: An Overview on its Security Threats” IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010

LV Shaohe, Wang Xiaodong, Zhao Xing," Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks", Computational Intelligence and Security 2008, CIS '08 International Conference on Volume 1Suzhou, pp.442-446, IEEE 2000

Baviskar B.R, Patil V.N," Black hole attacks mitigation and prevention in wireless sensor network", International Journal of Innovative Research in Advanced Engineering (IJIRAE), Volume 1, Issue 4, pp. 167-169, May 2014.

Maan younis Abdullah, Gui Wei Hua, Naif Alsharabi, “Wireless Sensor Networks Misdirection Attacker Challenges and Solutions”, 2008 IEEE 978-1-4244-2184-8/08/

Roshan Singh Sachan, Mohammad Wazid, D.P. Singh, Avita Kata and R.H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction”, 2012 IEEE 978-1-4673-4603-0/12/

I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci. “Wireless Sensor Networks: A survey” Broadband and Wireless Networking Laboratory, School of Electrical and Computer Engineering, Georgia institute of Technology, Atlanta, GA 30332, USA Received 12 December 2001; accepted 20 December 2001, pp . 392-422.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.