Abstract
The wireless sensor network (WSN) is the network of sensors which might be deployed in the surroundings for sensing any kind of physical phenomenon. Further sensed data is transmitted to base station (BS) in order to processes the data. During data processing, routed data security is most vital and is very challenging in WSN. The black hole is a most malicious attack, and it targets the routing protocols of sensors. This type of attack may have devastating impacts over hierarchical routing protocols. In this paper, anomaly-based hierarchical intrusion detection for black hole attack detection and prevention in WSN is presented. The black hole attack may happen if the intruder catches and reprogrammed a node set in a network for blocking the packets as opposed to transmitting them to the BS in WSN. Here, the active trust routing model concept is utilized for defining the black hole attacks in data packets routing. The results can demonstrate that, this presented system enhances the security with the prolonged life time of network and less energy utilization and high-efficiency throughput and packet delivery ratio (PDR) the life time of network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdul-Wahab Y, Alhassan A-B, Salifu A-M (2020) Extending the lifespan of wireless sensor networks: a survey of LEACH and non-LEACH routing protocols. International Journal of Computer Applications 975:8887
Sikora M, Fujdiak R, Kuchar K, Holasova E, Misurec J (2021) Generator of slow denial-of-service cyber attacks. Sensors 21(16):5473
Liu Y, Dong M, Ota K, Liu A (2016) ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans Inf Forensics Secur 11(9):2013–2027
Das S, Barani S, Wagh S, Sonavane SS (2016) Energy efficient and trustable routing protocol for wireless sensor networks based on genetic algorithm (E2TRP). In: 2016 international conference on automatic control and dynamic optimization techniques (ICACDOT), Pune, pp 154–159
Motamedi M, Yazdani N (2015) Detection of black hole attack in wireless sensor network using UAV. In: 2015 7th conference on information and knowledge technology (IKT), Urmia, pp 1–5
Geethu PC, Mohammed AR (2013) Defense mechanism against selective forwarding attack in wireless sensor networks. In: 2013 fourth international conference on computing, communications and networking technologies (ICCCNT), Tiruchengode, pp 1–4
Satyajayant M, Kabi B, Guoliang X (2011) BAMBi: blackhole attacks mitigation with multiple base stations in wireless sensor networks. In: IEEE ICC proceedings
Tan H, D Ostry H, Zic J, Jha S (2009) A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. ACM WiSec’09, Zurich, Switzerland, 16–18 March 2009
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, V.N. et al. (2023). Anomaly-Based Hierarchical Intrusion Detection for Black Hole Attack Detection and Prevention in WSN. In: Reddy, K.A., Devi, B.R., George, B., Raju, K.S., Sellathurai, M. (eds) Proceedings of Fourth International Conference on Computer and Communication Technologies. Lecture Notes in Networks and Systems, vol 606. Springer, Singapore. https://doi.org/10.1007/978-981-19-8563-8_30
Download citation
DOI: https://doi.org/10.1007/978-981-19-8563-8_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8562-1
Online ISBN: 978-981-19-8563-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)