Security is a serious issue in wireless sensor networks. Wireless sensor networks are widely used in variety of applications.
In wireless sensor networks all the sensor nodes will works together with a goal to send the data to the destination without any fail. Because
of their built in resource-constrained characteristics, they are vulnerable to various security attacks. A black hole attack is one of the serious
insider attack in which the attacker compromises a node and drops all packets that are routed through this compromised node. It is a serious
security attack which affects data collection. It may result in sensible data that will be eliminated or not able to be transmitted to the receiver
node. Because the network makes decisions depending on the nodes’ sensed data, the consequence is that the network will completely fail
and, more seriously it will make incorrect decisions. Therefore, how to detect and avoid black hole attack is of great significance for security
in WSNs. This paper propose a secure and trustable routing of data using a mobile node. Thus ensures the enhancement of network lifetime
and probability of successful routing.
Published In:IJCSN Journal Volume 6, Issue 3
Date of Publication : June 2017
Pages : 332-335
Figures :04
Tables : --
Muneebahmdhyiddeen : received the B.Tech degree in Computer
Science and Engineering from Calicut University, Kerala, India, in
2011, and currently doing M.Tech in Computer Science and
Engineering in MET’S School of Engineering, Mala – Abdul Kalam
Technological University, Kerala, India.
Asha Paul : is an Assistant professor in MET’S School of
Engineering Mala, Thrissur, Kerala. Received B.Tech degree in
Information Technology from East Point College of Engineering,
Bangalore and M.Tech from Karunya University, Coimbatore. She
has more than 3 years of teaching experience. Subject of interest
are Data Structures, Computer Organization and Design, Object
Oriented Programming, C Programming and Digital Data
Communication. She has presented paper on International
Conferences.
Bastian Babu : is an Assistant Professor in MET’S School of
Engineering Mala, Thrissur, Kerala. Received B.Tech degree in
Information Technology from Calicut University and M.Tech from
Karunya University, Coimbatore. He has Published papers on
International conferences.
Dr. D. Loganathan : is a Professor and Head of Computer Science
and Engineering department in MET’S School of Engineering, Mala,
Trissur, Kerala. After his B.E., and M.E degree, he accomplished a
doctoral degree from Anna University, Chennai, India. He has more
than 20 years of teaching experience and having 8 years of
research experience in engineering field. His research interest
includes Wireless Communication, Wireless Ad hoc Networks and
Image Processing. He has published several research papers in
various international journals.
Black hole attack, network lifetime, security, trust, wireless sensor networks
In this paper, we have proposed a trustable and secure
routing mechanism mainly aims at high successful routing
probability, security and scalability. Our proposed scheme
can quickly detect the nodal trust and then avoid suspicious
nodes to quickly achieve a nearly 100% successful routing
probability. The proposed scheme also aims at high energy
efficiency. It prevent the network being dead by providing
a mobile node for the routing. Thus it will enhance the
network lifetime. The analysis and result of our paper shows
that our mechanism improves the successful routing
probability. Further, it will also improves both the energy
efficiency and the network security performance. It has
important significance for wireless sensor network security.
[1] Anbuchelian, Selvamani. K, Chandarasekar. A “An Energy
Efficient Multipath Routing Scheme by Preventing Threats
in Wireless Sensor Networks”, Electrical and Computer
Engineering (CCECE), IEEE 27th Canadian Conference,
2014.
[2] Barleen Shinh “Novel Technique to Detect and Isolate
Black hole Attack in MANET”, International Journal Of
Engineering And Computer Science ISSN:2319-7242
Volume 3 Issue 6 June, 2014 Page No. 6513-6519.
[3] Liu A, M. Dong, K. Ota, and J. Long, “PHACK: An efficient
scheme for selective forwarding attack detection in WSNs,”
Sensors, vol. 15, no. 12, pp. 30942–30963, 2015.
[4] Lou W, W. Liu, Y. Fang, “SPREAD: Enhancing data
confidentiality in mobile ad hoc networks, IEEE
INFOCOM 2004, HongKong, China,March 2004
[5] Loganathan, D, Ramamoorthy P,“Performance Enhanced
in wireless Ad Hoc Networks Using Multicost Parameters
Based Optimized Link State Routing Protocol”,
indianjournals.com , Vol. 6, No. 8, pp. 864-872. 2016
[6] Mitali Khandelwal, Sachin Upadhyay, “An Opinion Trust
Based Detection and Prevention Method for Defending
Black-hole and Gray-hole Attacks in Wireless Sensor
Networks” , International Journal Of Scientific &
Engineering Research, Volume 7, Issue 7, July-2016
.
[7] Shu.T, M. Krunz, and S. Liu, “Secure data collection in
wireless sensor networks using randomized dispersive
routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp.
941–954, Jul. 2010
[8] Sun H M, C.-M. Chen, and Y.-C. Hsiao, “An efficient
countermeasureto the selective forwarding attack in
wireless sensor networks,” in Proc.IEEE TENCON,
Oct./Nov. 2007, pp. 1–4.
[9] Vipul Sharma, KirtiPatil, Ashish Tiwari “Detection and
Suppression of Blackhole Attack in Leach based Sensor
Network”, International Journal of Computer Technology
and Applications, Vol 5 (6),1873-1877, 2014.
[10] Yuxin Liu, Mianxiong Dong, Member, IEEE, Kaoru Ota,
Member, IEEE, and Anfeng Liu, “ActiveTrust: Secure and
Trustable Routing in Wireless Sensor Networks” IEEE
[11] Zheng Z, A. Liu, L. X. Cai, Z. Chen, and X. Shen, “Energy
and memory efficient clone detection in wireless sensor
networks,” IEEE Trans. Mobile Comput,
vol. 15, no. 5, pp. 1130–1143, May 2016.