Skip to main content

Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray Hole Attacks

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications
  • 747 Accesses

Abstract

In wireless sensor networks (WSNs) nodes are prone to fail due to energy depletion, hardware failure, malicious attack, and so on. Major attacks that cause problems/destruction in WSN are black hole and gray hole attacks. This paper proposes an adaptive exponential trust-based algorithm (AETBA) to calculate the trust factor (TF) of each node in every computing cycle. The proposed AETBA reduces the computation time in detecting black hole and gray hole nodes, also reducing power consumption. Moreover, the adaptive threshold strategy caters the low false positive rate. The simulation results prove the betterment of proposed method adaptive exponential trust-based algorithm (AETBA) over the established exponential trust-based algorithm (ETBA).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bharathidasan, A., Ponduru, V.A.S.: Sensor Networks: An Overview, Department of Computer Science, University of California, Davis, CA 96516 (2009)

    Google Scholar 

  2. Patole, J.R.: Clustering in Wireless Sensor Network using K-MEANS and MAP REDUCE Algorithm (2012)

    Google Scholar 

  3. Al-Shurman, M., Woo, S.M., Park, S.: Black Hole Attack in Mobile Ad-Hoc Networks. ACMSE’04, Huntville, AL, USA, 2–3 April 2004

    Google Scholar 

  4. Sarma, N.V.S.N., Gopi, M.: Energy efficient clustering using jumper firefly algorithm in wireless sensor networks. Int. J. Eng. Trends Technol. (IJETT) 10(11) (2014)

    Google Scholar 

  5. Wu, Y., Cho, Y., Qu, G.: Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks. In: IEEE CS Security and Privacy Workshops (2012)

    Google Scholar 

  6. Shila, D.M., Anjali, T.: Defending selective forwarding attacks in WMNs. In: IEEE International Conference on Electro/Information Technology, pp. 96–101 (2008)

    Google Scholar 

  7. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey, Computer Networks, pp. 393–422 (2000)

    Google Scholar 

  8. Cai, J., Yi, P., Chen, J., Wang, Z., Liu, N.: An adaptive approach to detecting black and grayhole attacks in ad hoc network. In: 24th IEEE International Conference on Advanced Information Networking and Applications (2010)

    Google Scholar 

  9. Virmani, D., Hemrajani, M., Chandel, S.: Exponential trust based mechanism to overcome black hole attack in wireless sensor networks. In: Proceedings of the International Conference on Computing, Informatics and Networks, pp. 59–63 (2014)

    Google Scholar 

  10. Yin, J., Madria, S.K.: A hierarchical secure routing protocol against blackhole attacks in sensor networks. In: IEEE International Conference on Sensor Networks (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepali Virmani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Deepali Virmani, Gupta, P. (2016). Adaptive Exponential Trust-Based Algorithm in Wireless Sensor Network to Detect Black Hole and Gray Hole Attacks. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications . Springer, Singapore. https://doi.org/10.1007/978-981-10-0287-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0287-8_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0286-1

  • Online ISBN: 978-981-10-0287-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics