Abstract
In wireless sensor networks (WSNs) nodes are prone to fail due to energy depletion, hardware failure, malicious attack, and so on. Major attacks that cause problems/destruction in WSN are black hole and gray hole attacks. This paper proposes an adaptive exponential trust-based algorithm (AETBA) to calculate the trust factor (TF) of each node in every computing cycle. The proposed AETBA reduces the computation time in detecting black hole and gray hole nodes, also reducing power consumption. Moreover, the adaptive threshold strategy caters the low false positive rate. The simulation results prove the betterment of proposed method adaptive exponential trust-based algorithm (AETBA) over the established exponential trust-based algorithm (ETBA).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bharathidasan, A., Ponduru, V.A.S.: Sensor Networks: An Overview, Department of Computer Science, University of California, Davis, CA 96516 (2009)
Patole, J.R.: Clustering in Wireless Sensor Network using K-MEANS and MAP REDUCE Algorithm (2012)
Al-Shurman, M., Woo, S.M., Park, S.: Black Hole Attack in Mobile Ad-Hoc Networks. ACMSE’04, Huntville, AL, USA, 2–3 April 2004
Sarma, N.V.S.N., Gopi, M.: Energy efficient clustering using jumper firefly algorithm in wireless sensor networks. Int. J. Eng. Trends Technol. (IJETT) 10(11) (2014)
Wu, Y., Cho, Y., Qu, G.: Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks. In: IEEE CS Security and Privacy Workshops (2012)
Shila, D.M., Anjali, T.: Defending selective forwarding attacks in WMNs. In: IEEE International Conference on Electro/Information Technology, pp. 96–101 (2008)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey, Computer Networks, pp. 393–422 (2000)
Cai, J., Yi, P., Chen, J., Wang, Z., Liu, N.: An adaptive approach to detecting black and grayhole attacks in ad hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications (2010)
Virmani, D., Hemrajani, M., Chandel, S.: Exponential trust based mechanism to overcome black hole attack in wireless sensor networks. In: Proceedings of the International Conference on Computing, Informatics and Networks, pp. 59–63 (2014)
Yin, J., Madria, S.K.: A hierarchical secure routing protocol against blackhole attacks in sensor networks. In: IEEE International Conference on Sensor Networks (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Deepali Virmani, Gupta, P. (2016). Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray Hole Attacks. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications . Springer, Singapore. https://doi.org/10.1007/978-981-10-0287-8_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-0287-8_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0286-1
Online ISBN: 978-981-10-0287-8
eBook Packages: EngineeringEngineering (R0)