Skip to main content
Log in

Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

In the recent era, security is the major problem in sensor networks. Wireless sensor networks (WSNs) are mostly used for various real-world applications. However, WSNs face a lot of insider and outsider attacks, and it is complex to identify and protect towards insider attacks. Generally, an insider attack, in which the intruders choose several received data packets to drop, threatens the clustered WSNs. This situation has occurred because of the unattended clustered environments in the network. To overcome this problem, this paper proposes a trustable and secure routing scheme using two-stage security mechanism, and dual assurance scheme, for selecting the node and securing the data packet for WSNs. Both schemes are based on Active Trust to protect several kinds of attacks, such as black hole attack, and selective forwarding attack, during routing. Therefore, this paper identifies the trusted path and provides the secure routing paths using trust and Cuckoo search algorithm. Energy is the performance parameter utilized in the proposed scheme. The experimental result proves that proposed system provides the assurance to prolong the network lifespan and the probability of secure routing path in the network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Kellner, A., Alfandi, O., Alfandi, O., Hogrefe, D.: A survey on measures for secure routing in wireless sensor networks. Proc. Int. J. Sens. Netw. Data Commun. 1, 17 (2012)

    Google Scholar 

  2. Dewal, P., Narula, G.S., Jain, V.: Detection and prevention of black hole attacks in cluster based wireless sensor networks. In: Proceedings in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 3399–3403 (2016)

  3. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings in the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, pp. 113–127 (2003)

  4. Alajmi, N.M., Elleithy, K.: A new approach for detecting and monitoring of selective forwarding attack in wireless sensor networks. In: Proceedings in 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, pp. 1–6 (2016)

  5. Pavan Kumar Guptha, Y., Madhu, M.: Improving security and detecting black hole attack in wireless sensor network. Int. J. Prof. Eng. Stud. 8(5), 260–265 (2017)

    Google Scholar 

  6. Momani, M., Challa, S.: Survey of trust models in different network domains. IJASUC 1(3), 1–19 (2010)

    Article  Google Scholar 

  7. Sathishkumar, R., Ramesh, C.: A modified method for preventing black-hole attack in mobile ad hoc networks. J. Eng. Appl. Sci. 11(2), 182–191 (2016)

    Google Scholar 

  8. Jain, A.: Trust based routing mechanism against black hole attack using AOMDV-IDS system in MANET format. Int. J. Emerg. Technol. Adv. Eng. 2(4), 653–661 (2012)

    Google Scholar 

  9. Chan, H., Perrg, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)

    Article  Google Scholar 

  10. Zhu, T., Zhong, Z., He, T., Zhang, Z.-L.: Energy synchronized computing for sustainable sensor networks. Ad Hoc Netw. 11(4), 1392–1404 (2013)

    Article  Google Scholar 

  11. Khan, W.Z., Yang, X., Aalsalem, M.Y., Arshada, Q.: The selective forwarding attack in sensor networks: detections and countermeasures. Int. J. Wirel. Microw. Technol. 2, 33–44 (2012)

    Article  Google Scholar 

  12. Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. In: Proceedings in Fourth International IEEE Conference on Computer Sciences and Convergence Information Technology, Seoul, South Korea, pp. 824–828 (2009)

  13. Bin, T., Xian, Y.Y., Dong, L., Qi, L., Xin, Y.: A security framework for wireless sensor networks. J. Chin. Univ. Posts Telecommun. 17(Supplement 2), 118–122 (2010)

    Google Scholar 

  14. Latha, D., Palanivel, K.: Secure routing through trusted nodes in wireless sensor networks a survey. Proc. Int. J. Adv. Res. Comput. Eng. Technol. (IJARCET) 3(11), 3792–3799 (2014)

    Google Scholar 

  15. Liu, Y., Dong, M., Ota, K., Liu, A.: Active Trust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11(9), 2013–2027 (2016)

    Article  Google Scholar 

  16. Das, S., Barani, S., Wagh, S., Sonavane, S.S.: Energy efficient and trustable routing protocol for wireless sensor networks based on genetic algorithm (E2TRP). In: Proceedings in IEEE International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, India, pp. 154–159 (2016)

  17. Sharmila, S., Umamaheswari, G.: Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In: Proceedings in 2011 International Conference on Process Automation, Control and Computing, Coimbatore, India, pp. 1–6 (2011)

  18. Geethu P.C., Mohammed, A.R.: Defense mechanism against selective forwarding attack in wire-less sensor networks. In: Proceedings in 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, pp. 1–4 (2013)

  19. Motamedi, M., Yazdani, N.: Detection of black hole attack in wireless sensor network using uav. In: Proceedings in 2015 7th Conference on Information and Knowledge Technology (IKT), Urmia, Iran, pp. 1–5 (2015)

  20. Kumar, R., Kumar, D.: Multi-objective fractional artificial bee colony algorithm to energy aware routing protocol in wireless sensor network. Wirel. Netw. 22(5), 1461–1474 (2016)

    Article  Google Scholar 

  21. Sanzgiri, K., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: A secure routing protocol for ad hoc networks. In: Proceedings of 10th IEEE International Conference on Network Protocols, Paris, France (2002)

  22. Amir, H.G., Yang, X.-S., Amir, H.A.: Cuckoo search algorithm: a metaheuristic approach to solve structural optimization problems. Eng. Comput. 29(1), 17–35 (2013)

    Article  Google Scholar 

  23. Yang, X.-S., Deb, S.: Cuckoo search via Levy flights. In: Proceedings of the World Congress in Nature & Biologically Inspired Computing, Coimbatore, India, pp. 210–214 (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak C. Mehetre.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mehetre, D.C., Roslin, S.E. & Wagh, S.J. Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Comput 22 (Suppl 1), 1313–1328 (2019). https://doi.org/10.1007/s10586-017-1622-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1622-9

Keywords

Navigation