Abstract
The blackhole attack is a typical kind of attack in wireless sensor network (WSN), consisting two types, namely passive attacks and active attacks, of which the latter can cause greater threat. In this paper, considering the principles and characteristics of the active blackhole attacks, an effective approach that can detect and defense active blackhole attacks is presented by improving the AODV routing protocol combining flow analysis. NS2 simulation results confirm the effectiveness of this method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Yick, J., Mukherjee, B., Ghosal, D.: Wireless Sensor Network Survey. J. Computer Networks 52(12), 2292–2330 (2008)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on Demand Distance Vector (AODV) Routing (RFC 3561). J. IETF MANET Working Group (2003)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. J. Ad hoc Networks. 1(2), 293–315 (2003)
Dokurer, S., Erten, Y.M., Acar, C.E.: Performance Analysis of Ad-hoc Networks under Black hole Attacks. In: Proceedings of the IEEE SoutheastCon, pp. 148–153 (2007)
Zapata, M.G.: Secure Ad hoc on-demand Distance Vector Routing. J. ACM SIGMOBILE Mobile Computing and Communications Review 6(3), 106–107 (2002)
Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp. 193–204 (2002)
Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Nobile Wireless Ad hoc Networks. J. Ad Hoc Networks. 1(1), 175–192 (2003)
Yi, S., Naldurg, P., Kravets, R.: A Security-aware Routing Protocol for Wireless Ad hoc Networks. J. Urbana. 51, 61801 (2002)
Shurman, M., Yoo, S.M., Park, S.: Black hole Attack in Mobile Ad hoc Networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96–97. ACM (2004)
Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of Service Resilience in Ad hoc Networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 202–215. ACM (2004)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM (2000)
Bollacker, K.D., Lawrence, S., Giles, C.L.: Discovering Relevant Scientific Literature on the Web. J. Intelligent Systems and their Applications 15(2), 42–47 (2000)
Lieberman, H.: Letizia: An Agent that Assists Web Browsing. J. IJCAI (1), 924–929 (1995)
Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad hoc Networks. In: Personal Mobile Communications Conference, pp. 490–495. IET, European (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Gao, H., Wu, R., Cao, M., Zhang, C. (2014). Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8631. Springer, Cham. https://doi.org/10.1007/978-3-319-11194-0_53
Download citation
DOI: https://doi.org/10.1007/978-3-319-11194-0_53
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11193-3
Online ISBN: 978-3-319-11194-0
eBook Packages: Computer ScienceComputer Science (R0)