A light-weight solution for blackhole attacks in wireless sensor networks

A light-weight solution for blackhole attacks in wireless sensor networks

Wireless sensors, which are smaller and cheaper, have started being used in many different applications.Military applications, health care and industrial monitoring, environmental applications, smart grids, and vehicularad-hoc networks are some of the best known applications of wireless sensors. In some applications, especially military,environmental, and health care applications, it is required that the communication between sensor nodes be encrypted toachieve privacy and confidentiality. In this work, some modifications have been made to the ad-hoc on-demand distancevector routing protocol, mostly preferred in wireless sensor networks, to make data communications more reliable. Theproposed routing protocol is shown to be capable of detecting and eliminating malicious blackhole nodes. It also securesthe transmitted data. The proposed mechanism has been compared with the original ad-hoc on-demand distance vectorrouting protocol in terms of average end-to-end delay and data delivery ratio. The performance evaluations show that theproposed secure routing protocol eliminates malicious nodes in the network. Furthermore, it achieves almost the samedelivery ratios as the original ad-hoc on-demand distance vector routing protocol and does not cause extra communicationdelay.

___

  • [1] Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput Netw 2002; 38: 393-422.
  • [2] Al-Karaki JN, Kamal AE. Routing techniques in wireless sensor networks: a survey. IEEE Wirel Commun 2004; 11: 6-28.
  • [3] Rehan W, Fischer S, Rehan M, Rehmani MB. A comprehensive survey on multichannel routing in wireless sensor networks. J Netw Comput Appl 2017; 95: 1-25.
  • [4] Puccinelli D, Haenggi M. Wireless sensor networks: applications and challenges of ubiquitous sensing. IEEE Circ Syst Mag 2005; 5: 19-31.
  • [5] Dener M. WiSeN: A new sensor node for smart applications with wireless sensor networks. Comput Electr Eng 2017; 64: 380-394.
  • [6] Rashid B, Rehmani MB. Applications of wireless sensor networks for urban areas: a survey. J Netw Comput Appl 2016; 60: 192-219.
  • [7] Patil HK, Chen TM. Wireless sensor network security. In: Vacca JR, editor. Computer and Information Security Handbook (Second Edition). Boston, MA, USA: Morgan Kaufmann, 2013. pp. 301-322.
  • [8] Patil HK, Chen TM. Wireless sensor network security: the Internet of things. In: Vacca JR, editor. Computer and Information Security Handbook (Third Edition). Boston, MA, USA: Morgan Kaufmann, 2017. pp. 317-337.
  • [9] Finogeev AG, Finogeev AA. Information attacks and security in wireless sensor networks of industrial SCADA systems. J Ind Inf Integr 2017; 5: 6-16.
  • [10] Kompara M, Holbl M. Survey on security in intra-body area network communication. Ad Hoc Netw 2018; 70: 23-43.
  • [11] Islam K, Shen W, Wang X. Wireless sensor network reliability and security in factory automation: a survey. IEEE T Syst Man Cy C 2012; 42: 1243-1256.
  • [12] He D, Zeadally S, Kumar N, Lee JH. Anonymous authentication for wireless body area networks with provable security. IEEE Syst J 2017; 11: 2590-2601.
  • [13] Li H, He Y, Cheng X, Zhu H, Sun L. Security and privacy in localization for underwater sensor networks. IEEE Commun Mag 2015; 53: 56-62.
  • [14] Tomic I, McCann JA. A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet Things 2017; 4: 1910-1923.
  • [15] Deshmukh SR, Chatur PN, Bhople NB. AODV-based secure routing against blackhole attack in MANET. In: 2016 IEEE International Conference on Recent Trends in Electronics, Information Communication Technology; Bangalore, India; 2016. pp. 1960-1964.
  • [16] Jain S, Khuteta A. Detecting and overcoming blackhole attack in mobile ad hoc network. In: 2015 International Conference on Green Computing and Internet of Things; Noida, India; 2015. pp. 225-229.
  • [17] Patidarl K, Dubey V. Modification in routing mechanism of AODV for defending blackhole and wormhole attacks. In: 2014 Conference on IT in Business, Industry and Government; Indore, India; 2014. pp. 1-6.
  • [18] Elmahdi E, Yoo S, Sharshembiev K. Securing data forwarding against blackhole attacks in mobile ad hoc networks. In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference; Las Vegas, NV, USA; 2018. pp. 463-467.
  • [19] Kaurav A, Kumar KA. Detection and prevention of blackhole attack in wireless sensor network using ns-2.35 simulator. Int J Sci Res Comput Sci Eng Inf Technol 2017; 2: 717-722.
  • [20] Kumar V, Kumar R. An adaptive approach for detection of blackhole attack in mobile ad hoc network. Procedia Comput Sci 2015; 48: 472-479.
  • [21] Du X, Chen HH. Security in wireless sensor networks. IEEE Wirel Commun 2008; 15: 60-66.
  • [22] Jaballah WB, Conti M, File G, Mosbah M, Zemmari A. Whac-a-mole: smart node positioning in clone attack in wireless sensor networks. Comput Commun 2018; 119: 66-82.
  • [23] Zhao X, Zhu J, Liang X, Jiang S, Chen Q. Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks. IET Inform Secur 2017; 11: 82-88.
  • [24] Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A. REATO: Reacting to denial of service attacks in the internet of things. Comput Netw 2018; 137: 37-48.
  • [25] Panos C, Ntantogian C, Malliaros S, Xenakis C. Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks. Comput Netw 2017; 113: 94-10.
  • [26] Liu Y, Dong M, Ota K, Liu A. ActiveTrust: Secure and trustable routing in wireless sensor networks. IEEE T Inf Foren Sec 2016; 11: 2013-2027.
  • [27] Hsueh CT, Wen CY, Ouyang YC. A secure scheme against power exhausting attacks in hierarchical wireless sensor networks. IEEE Sens J 2015; 15: 3590-3602.
  • [28] Pu C, Lim S. A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: design, analysis, and evaluation. IEEE Syst J 2018; 12: 834-842.
  • [29] Li J, Wang D, Wang Y. Security DV-hop localisation algorithm against wormhole attack in wireless sensor network. IET Wirel Sens Sy 2018; 8: 68-75.
  • [30] Majahan M, Reddy KTV, Rajput M. Design and simulation of a blacklisting technique for detection of hello flood attack on LEACH protocol. Procedia Comput Sci 2016; 79: 675-682.
  • [31] Mokdad L, Ben-Othmna J, Nguyen AT. DJAVAN: Detecting jamming attacks in vehicle ad hoc networks. Perform Evaluation 2015; 87: 47-59.
  • [32] Razaque A, Abdulghafour M, Khan MJ. Detection of selfish attack over wireless body area networks. In: IEEE 2017 Conference on Open Systems; Miri, Malaysia; 2017. pp. 48-52.
  • [33] Zhu J, Zou Y, Zheng B. Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access 2017; 5: 5313-5320.
  • [34] Rani TP, Jayakumar C. Unique identity and localization based replica node detection in hierarchical wireless sensor networks. Comput Electr Eng 2017; 64: 148-162.
  • [35] Perkins CE, Royer EM. Ad-hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications; New Orleans, LA, USA; 1999. pp. 90-100.
  • [36] Cazorla M, Gourgeon S, Marquet K, Minier M. Survey and benchmark of lightweight block ciphers for MSP430 16‐bit microcontroller. Secur Commun Netw 2015; 8: 3564-3579.