Secure Localization and Implement a New Routing Algorithm in Wireless Sensor Network

Akansha Sajwan, Rahul Joshi


Due to the wireless nature and infrastructure-less environment of WSN, they are more vulnerable to many types of security attacks. This paper proposes a technique to detect the attack using multiple base-stations and a check agent based technology. This technique is Energy efficient, Fast, Lightweight and Reduces message complexity. An effective solution is proposed that uses multiple base stations to improve the delivery of the packets from the sensor nodes reaching at least one base station in the network, thus ensuring high packet delivery success. The proposed technique is more efficient than the previous techniques and gives better results. Check agent is a software program which is self-controlling and monitoring, smart homes, structures, target it moves from node to node and checks wireless nodes envelop embedded electronic sensors along with battery and RF devices. The purpose of these sensors is to sense and recognize diverse biological parameters, for instance,   temperature, pressure, air pollution etc., to communicate with the neighboring nodes and compute the gathered data. Their application space is huge as they can be deployed in various fields like agriculture the presence tracking, health care, and military surveillance and of attacker nodes in the network. Routing through multiple base stations algorithm is only activated when there is a chance of attack on the network. This method prevents the attack imposed by both single and multiple attacker nodes. The tool used to implement the proposed algorithm is NS2, which is an object oriented event drive software package. The result of the simulation study expected to get good network performance by minimizing the packet losses as well as effectively prevent the attack against wireless sensor networks. A solution to avoid the attack has been proposed. The solution will be implemented in NS-2.

Full Text:



H.Weerasinge and H.Fu ―Preventing Black Hole journal of engineering science and technology, vol. 4,Attack in Mobile Ad hoc Networks: simulation, no. 2 pp. 24 implementation and evaluation ‖ international journal of software engg. and its applications, vol2,no3 in MANET‖, Journal Of Networks, Vol. 3, NO. 5,

Jian Yin, Sanjay Madria, ―A Hierarchical Secure Routing Protocol against attack, IEEE SUTC 2012 Taiwan, 5-7 June 2012

Dokurer, S.;Ert, Y.M.;and Acar, C.E.(2011). Performance analysis of ad hoc networks under black hole attacks. SoutheastCon, 2011, Proceedings IEEE,148–153.

Dr. Karim Konate and Abdourahime Gaye(2011) a proposal mechanism against the attacks: cooperative black hole, blackmail, overflow and selfish in routing protocol of mobile ad hoc network”, international journal of future generation communication and networking Vol.4, No. 2

S. Roy, S. Singh, S. Choudhary, and N. Debnath. ―Countering sinkhole and black hole attacks on networks using dynamic trust management ‖; In IEEE Symposium on Computers and Communications, 2008; pp. 537–542.

Tao Shu, Marwan Krunz and Sisi Liu, ―Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes‖ In IEEE INFOCOM, 2009. pp. 2846–2850.

G. Sladic , M. Vidakovic and Z. Konjovic ―Agent based system for network availability and vulnerability monitoring‖ 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics, September 8-10, 2011, Subotica, Serbia.

Satyajayant Misra, Kabi Bhattarai, and Guoliang Xue ―BAMBi: Black hole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks‖ IEEE Communications Society subject matter experts for publication in the IEEE ICC 2011 proceedings.

Atul Yadav et al., ―Study of Network Layer Attacks and Countermeasures in Wireless Sensor Network‖ International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 4, August 2012.

Gulshan Kumar, Mritunjay Rai and Gang-soo Lee ― Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement- International Journal of Security and Its Applications Vol. 6, No. 1, January, 2012

M. Ketel, N.Dogan, A.Homaifar―Distributed Sensor Networks Based on Mobile Agents Paradigm‖ International Conference on Artificial Intelligence and Embedded Systems (ICAIES'2012) Singapore, 2012;

S. Sharma and R. Gupta, (2012) ―Simulation study of black hole attack in the mobile ad-hoc ne



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.