Skip to main content

Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8631))

Abstract

The blackhole attack is a typical kind of attack in wireless sensor network (WSN), consisting two types, namely passive attacks and active attacks, of which the latter can cause greater threat. In this paper, considering the principles and characteristics of the active blackhole attacks, an effective approach that can detect and defense active blackhole attacks is presented by improving the AODV routing protocol combining flow analysis. NS2 simulation results confirm the effectiveness of this method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Yick, J., Mukherjee, B., Ghosal, D.: Wireless Sensor Network Survey. J. Computer Networks 52(12), 2292–2330 (2008)

    Article  Google Scholar 

  2. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on Demand Distance Vector (AODV) Routing (RFC 3561). J. IETF MANET Working Group (2003)

    Google Scholar 

  3. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. J. Ad hoc Networks. 1(2), 293–315 (2003)

    Article  Google Scholar 

  4. Dokurer, S., Erten, Y.M., Acar, C.E.: Performance Analysis of Ad-hoc Networks under Black hole Attacks. In: Proceedings of the IEEE SoutheastCon, pp. 148–153 (2007)

    Google Scholar 

  5. Zapata, M.G.: Secure Ad hoc on-demand Distance Vector Routing. J. ACM SIGMOBILE Mobile Computing and Communications Review 6(3), 106–107 (2002)

    Article  Google Scholar 

  6. Papadimitratos, P., Haas, Z.J.: Secure Routing for Mobile Ad hoc Networks. In: Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), pp. 193–204 (2002)

    Google Scholar 

  7. Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Nobile Wireless Ad hoc Networks. J. Ad Hoc Networks. 1(1), 175–192 (2003)

    Article  Google Scholar 

  8. Yi, S., Naldurg, P., Kravets, R.: A Security-aware Routing Protocol for Wireless Ad hoc Networks. J. Urbana. 51, 61801 (2002)

    Google Scholar 

  9. Shurman, M., Yoo, S.M., Park, S.: Black hole Attack in Mobile Ad hoc Networks. In: Proceedings of the 42nd Annual Southeast Regional Conference, pp. 96–97. ACM (2004)

    Google Scholar 

  10. Aad, I., Hubaux, J.P., Knightly, E.W.: Denial of Service Resilience in Ad hoc Networks. In: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, pp. 202–215. ACM (2004)

    Google Scholar 

  11. Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255–265. ACM (2000)

    Google Scholar 

  12. Bollacker, K.D., Lawrence, S., Giles, C.L.: Discovering Relevant Scientific Literature on the Web. J. Intelligent Systems and their Applications 15(2), 42–47 (2000)

    Google Scholar 

  13. Lieberman, H.: Letizia: An Agent that Assists Web Browsing. J. IJCAI (1), 924–929 (1995)

    Google Scholar 

  14. Sun, B., Guan, Y., Chen, J., Pooch, U.W.: Detecting Black-hole Attack in Mobile Ad hoc Networks. In: Personal Mobile Communications Conference, pp. 490–495. IET, European (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Gao, H., Wu, R., Cao, M., Zhang, C. (2014). Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8631. Springer, Cham. https://doi.org/10.1007/978-3-319-11194-0_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11194-0_53

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11193-3

  • Online ISBN: 978-3-319-11194-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics