Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol  
  Authors : Umashankar Ghugar; Jayaram Pradhan; Monalisa Biswal
  Cite as:

 

Wireless Sensor Networks (WSN) has wide application in data gathering and data transmission as per the user’s requirement and it consist of number of nodes. These nodes have limited battery power, limited resources and limited computational power .Due to all these factors, WSN faces more security threats. Security issues are a vital problem to be solved in Wireless Sensor networks (WSNs). Different types of intrusion detection systems (IDS) are developed to make WSN more secure. In this paper the proposed IDS are based on watchdog monitoring technique and are able to detect Black Hole attacks using AODV (Ad- Hoc On-Demand Distance Vector) Protocol. Besides, the betterment that makes watchdog monitoring technique more reliable are described and the results of simulations of the IDS on NS-2 simulator are presented.

 

Published In : IJCSN Journal Volume 5, Issue 4

Date of Publication : August 2016

Pages : 645-652

Figures :05

Tables : 02

 

Umashankar Ghugar : received his B.E degree in IT from Orissa Utkal University in 2006 and M.Tech degree in Computer Science from Fakir Mohan University,Balasore in 2012.He has 07 years of Teaching experience and Now He is PhD Scholar in Computer Science subject in Berhampur University,Orissa. His research interests are in Computer Networks such as Wireless Sensor Network and Network security. He is currently a member of IACSIT, CSTA and IRED.He has published 02 International journal papers.

Dr.(Prof)Jayaram Pradhan : started his teaching career as Computer Sc lecturer at Bhopal University in the year 1985 after completing M.Phil Computer Sc from J.N University New Delhi. He joined in the department of CSEA, REC Rourkela in the year 1986 where he completed his doctorial dissertation under Sambalpur University. In the year 1993 he joined in the department of Computer Science Berhampur University and worked as founder Head of the department. During more than three decade experience he has offered different courses to DCA, MCA, BE, M.Tech students, beside guided many M.Tech, Ph.D scholars, published many papers, reviewed different manuscripts of journals, adjudicated several M.Tech/Ph.D thesis of other Indian University, design many courses, deliver several talk at different Universities with in India and abroad. Now He is the PG Council Chairman of Berhampur University,Orissa.In addition he has many academic administrative assignment during this period. His present research interests include Designing of Algorithms, Cryptography and computationally hard problems.

Dr.(Mrs)Monalisha Biswal : received her PhD Sambalpur University,Orissa.Now she is working as a Asst Professor in NIR Raipur in Department of Electrical Engineering. She has published 17 International Referred journal papers. She is a Member of IEEE,Associate Member, The Institution of Engineers, India, Life Member of Orissa Bigyan Academy,ISTE, Life Member: LM-95003. Her research interests are power System Protection, Smart Grid Protection, Wide Area Protection, FACTS Devices, Adaptive Relaying, Signal Processing Application to Power System Relaying.

 

 

 

 

 

 

 

AODV, RREQ, RREP, IDS, PDR, DSR

In this paper, we presented an effective method for detecting the black hole attack in a wireless sensor network. The watchdog technique is implemented in this work. The proposed model better improves the network performance by avoiding the malicious node from the network. Future work can be to focus on the detection of other attacks and comparison with black hole attack with different routing protocol. It may be categorized on the basis of how much they affect the performance of the network. The detection of other attacks as well as the elimination strategy for those attacks has to be carried out in future research.

 

[1] M. Tiwari, K.Veer Arya, R. Choudhari, K. Sidharth Choudhary, “Designing Intrusion Detection to Detect Black hole and Selective Forwarding Attack in WSN based on local Information”, “2009 Fourth International Conference on Computer Sciences and Convergence Information Technology” [2] E. Nam Huh and T. Hong Hai, “Lightweight Intrusion Detection for Wireless Sensor Networks” [3] J. Du, J. Li, “ A Study of Security Routing Protocol For Wireless Sensor Network”, “2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control” [4] F. Bao, I. Ray Chen, M. Jeong Chang, and J.-Hee Cho, “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection”, “IEEE Transactions On Network And Service Management, June 2012” [5] M. A. Rassam, M.A. Maarof and A. Zainal, “A Survey of Intrusion Detection Schemes in Wireless Sensor Networks”, “American Journal of Applied Sciences, 2012” [6] W. Ribeiro Pires J´unior, T. H. de Paula Figueiredo H. Chi Wong, A. A.F. Loureiro, “Malicious Node Detection in Wireless Sensor Networks”, “Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS’04),IEEE 2004” [7] V. K. Jatav, M. Tripathi , M S Gaur and V. Laxmi, “Wireless Sensor Networks: Attack Models and Detection”, “2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) © (2012) IACSIT Press, Singapore” [8] A. Paula R. da Silva, M.H.T. Martins Bruno, P.S. Rocha, A. A.F. Loureiro, L. B. Ruiz, H. Chi Wong, “Decentralized intrusion detection in wireless sensor networks”, “Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, 2005”. [9] G..Saravanan, P. R.Patil, M.R. Kumar, “Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing”, “IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278- 0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. I (Mar-Apr. 2014), PP 26-31” [10] K Abd. Jalil, Z. Ahmad, J. Lail Ab Manan , “Mitigation of Black Hole Attacks for AODV Routing Protocol”, “International Journal on New Computer Architectures and Their Applications (IJNCAA) The Society of Digital Information and Wireless Communications, 2011” [11] S. Nishanthi “Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm”, “International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013” [12] Geethu P C, R. Mohammed A, “Defense Mechanism against Selective Forwarding Attack in Wireless Sensor Networks”, “4th International Conference on Computing, Communications and Networking Technologies-2013”. [13] Krontiris, I., T. Dimitriou and F.C. Freiling, “Towards intrusion detection in wireless sensor networks.”, “Proceeding of the 13th European Wireless Conference, 2007”. [14] T. Singh, H. Kaur Arora “Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool”, “International Journal of Advanced Computer Science and Applications, 2013” [15] M. Bahekmat, M. Hossein Yaghmaee, A. Sadat Heydari Yazdi, and S. Sadeghi, “A Novel Algorithm for Detecting Sinkhole Attacks in WSNs”, “International Journal of Computer Theory and Engineering, June 2012” [16] M. Al-Shurman and Seong-Moo Yoo, S. Park, “Black Hole Attack in Mobile Ad Hoc Networks”, “Association for Computing Machinery Southeast Conference, April 2004” [17] Kumar, V.: Simulation and Comparison of AODV and DSR Routing Protocols in MANETs, Master Thesis (2009). [18] Ei Ei Khin and Thandar Phyu,” IMPACT OF BLACKHOLE ATTACK ON AODV ROUTING PROTOCOL”, “International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014.” [19] H.Debar,M Dacier and A.Wepsi, 1999,”Towards Taxonomy of Intrusion Detection System.Computer network,31:805-822. [20] P.Butch and C.Ko ”Challenges in Intrusion Detection for wireless Sensor Networks”, In Proceeding of application and the Internet Workshop.2003 symposium on.pp.368378.2003”. [21] Ei Ei Khin and T.Phyu” Mitigating Scheme for Black Hole Attack in AODV Routing Protocol” ,International Conference on Advances in Engineering and Technology (ICAET'2014) March 29-30, 2014 Singapore. [22] Ei Ei Khin and T.Phyu” Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET” International Journal of Computer Science and Business Informatics. [23] M. Mohanapriya , Ilango Krishnamurthi” Modified DSR protocol for detection and removal of selective black hole attack in MANET”, Computers and Electrical Engineering 40 (2014) 530–538.