Abstract
A wireless sensor network (WSN) is a network of devices that can communicate after gathering information by monitoring any region through wireless links. Due to this delicate arrangement several numbers of attacks directly affects the WSN functions especially denial of service (DoS). DoS is the most popular and frequent among all to affect WSN. Recently, blackhole attack has taken over it and comprises security and integrity of WSN. Secure and reliable data transmissions are the prime requirements of WSN but new evolving attacks are threats to achieve this objective. This paper proposes an algorithm that detects and recovers nodes from blackhole assaults in WSN. The proposed algorithm Trusted and Secure routing (TSR) involves detector nodes, moves in the network algorithm identifies blackhole attacks in the network, marks this node as balckhole and subsequently excludes from the network. It enables to transmit data securely with alternate path using detector node. The proposed algorithm increases the performance and the delivery ratio of data in WSN. The experimental results show reliable and secure data transmission from DoS and blackhole attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cao, Q., Abdelzaher, T., Stankovic, J., Whitehouse, K., Luo, L.: Declarative tracepoints: a programmable and application independent debugging system for wireless sensor networks. In: Proceedings of the ACM SenSys, Raleigh, NC, USA, pp. 85–98 (2008)
Shu, T., Krunz, M., Liu, S.: Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Trans. Mobile Comput. 9(7), 941–954 (2010)
Souihli, O., Frikha, M., Hamouda, B.M.: Load-balancing in MANET shortest-path routing protocols. Ad Hoc Netw. 7(2), 431–442 (2009)
Khan, S., Prasad, R., Saurabh, P., Verma, B.: Weight based secure approach for identifying selfishness behavior of node in MANET. In: Satapathy, S., Tavares, J., Bhateja, V., Mohanty, J. (eds.) Information and Decision Sciences. Advances in Intelligent Systems and Computing, vol. 701, pp. 387–397. Springer, Singapore (2017)
Aad, I., Hubaux, J.-P., Knightly, W.E.: Impact of denial of service attacks on ad hoc networks. IEEE-ACM Trans. Netw. 16(4), 791–802 (2008)
Mandala, S., Jenni, K., Ngadi, A., Kamat, M., Coulibaly, Y.: Quantifying the severity of blackhole attack in wireless mobile adhoc networks. In: Security in Computing and Communications. Springer, Heidelberg (2014)
Liu, Y., Dong, M., Ota, K., Liu, A.: ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(9), 2013–2028 (2016)
Dong, M., Ota, K., Liu, A., Guo, M.: Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 27(1), 225–236 (2016)
Liu, X., Dong, M., Ota, K., Hung, P., Liu, A.: Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans. Serv. Comput. 9(2), 186–198 (2016)
Dong, W., Liu, Y., He, Y., Zhu, T., Chen, C.: Measurement and analysis on the packet delivery performance in a large-scale sensor network. IEEE/ACM Trans. Netw. 22(6), 1952–1963 (2014)
Illiano, P.V., Lupu, C.E.: Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manag. 12(3), 496–512 (2015)
Ma, Q., Liu, K., Zhu, T., Gong, W., Liu, Y.: BOND: exploring hidden bottleneck nodes in large-scale wireless sensor networks. In: Proceedings of the IEEE ICDCS, Madrid, Spain, pp. 399–408 (2014)
Magistretti, E., Gurewitz, O., Knightly, E.: Inferring and mitigating a link’s hindering transmissions in managed 802.11 wireless networks. In: Proceedings of the ACM MobiCom, Chicago, IL, USA, pp. 305–316 (2010)
Son, D., Krishnamachari, B., Heidemann, J.: Experimental analysis of concurrent packet transmissions in low-power wireless networks. In: Proceedings of the ACM SenSys, San Diego, CA, USA, pp. 237–250 (2005)
Li, X., Ma, Q., Cao, Z., Liu, K., Liu, Y.: Enhancing visibility of network performance in large-scale sensor networks. In: Proceedings of the IEEE ICDCS, Madrid, Spain, pp. 409–418 (2014)
Saurabh, P., Verma, B.: An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016)
Saurabh, P., Verma, B.: Immunity inspired cooperative agent based security system. Int. Arab J. Inf. Technol. 15(2), 289–295 (2018)
Saurabh, P., Verma, B., Sharma, S.: An immunity inspired anomaly detection system: a general framework. In: Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012). Advances in Intelligent Systems and Computing, vol. 202, pp. 417–428. Springer (2012)
Saurabh, P., Verma, B., Sharma, S.: Biologically inspired computer security system: the way ahead. In: Recent Trends in Computer Networks & Distributed Systems Security. CCIS, vol. 335, pp. 474–484. Springer (2011)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Bisen, D., Barmaiya, B., Prasad, R., Saurabh, P. (2021). Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor Network. In: Abraham, A., Shandilya, S., Garcia-Hernandez, L., Varela, M. (eds) Hybrid Intelligent Systems. HIS 2019. Advances in Intelligent Systems and Computing, vol 1179. Springer, Cham. https://doi.org/10.1007/978-3-030-49336-3_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-49336-3_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-49335-6
Online ISBN: 978-3-030-49336-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)