Skip to main content

Anomaly-Based Hierarchical Intrusion Detection for Black Hole Attack Detection and Prevention in WSN

  • Conference paper
  • First Online:
Proceedings of Fourth International Conference on Computer and Communication Technologies

Abstract

The wireless sensor network (WSN) is the network of sensors which might be deployed in the surroundings for sensing any kind of physical phenomenon. Further sensed data is transmitted to base station (BS) in order to processes the data. During data processing, routed data security is most vital and is very challenging in WSN. The black hole is a most malicious attack, and it targets the routing protocols of sensors. This type of attack may have devastating impacts over hierarchical routing protocols. In this paper, anomaly-based hierarchical intrusion detection for black hole attack detection and prevention in WSN is presented. The black hole attack may happen if the intruder catches and reprogrammed a node set in a network for blocking the packets as opposed to transmitting them to the BS in WSN. Here, the active trust routing model concept is utilized for defining the black hole attacks in data packets routing. The results can demonstrate that, this presented system enhances the security with the prolonged life time of network and less energy utilization and high-efficiency throughput and packet delivery ratio (PDR) the life time of network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdul-Wahab Y, Alhassan A-B, Salifu A-M (2020) Extending the lifespan of wireless sensor networks: a survey of LEACH and non-LEACH routing protocols. International Journal of Computer Applications 975:8887

    Google Scholar 

  2. Sikora M, Fujdiak R, Kuchar K, Holasova E, Misurec J (2021) Generator of slow denial-of-service cyber attacks. Sensors 21(16):5473

    Article  Google Scholar 

  3. Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027

    Article  Google Scholar 

  4. Das S, Barani S, Wagh S, Sonavane SS (2016) Energy efficient and trustable routing protocol for wireless sensor networks based on genetic algorithm (E2TRP). In: 2016 international conference on automatic control and dynamic optimization techniques (ICACDOT), Pune, pp 154–159

    Google Scholar 

  5. Motamedi M, Yazdani N (2015) Detection of black hole attack in wireless sensor network using UAV. In: 2015 7th conference on information and knowledge technology (IKT), Urmia, pp 1–5

    Google Scholar 

  6. Geethu PC, Mohammed AR (2013) Defense mechanism against selective forwarding attack in wireless sensor networks. In: 2013 fourth international conference on computing, communications and networking technologies (ICCCNT), Tiruchengode, pp 1–4

    Google Scholar 

  7. Satyajayant M, Kabi B, Guoliang X (2011) BAMBi: blackhole attacks mitigation with multiple base stations in wireless sensor networks. In: IEEE ICC proceedings

    Google Scholar 

  8. Tan H, D Ostry H, Zic J, Jha S (2009) A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ACM WiSec’09, Zurich, Switzerland, 16–18 March 2009

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Voruganti Naresh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, V.N. et al. (2023). Anomaly-Based Hierarchical Intrusion Detection for Black Hole Attack Detection and Prevention in WSN. In: Reddy, K.A., Devi, B.R., George, B., Raju, K.S., Sellathurai, M. (eds) Proceedings of Fourth International Conference on Computer and Communication Technologies. Lecture Notes in Networks and Systems, vol 606. Springer, Singapore. https://doi.org/10.1007/978-981-19-8563-8_30

Download citation

Publish with us

Policies and ethics