Jensen–Shannon Divergence Based Independent Component Analysis to Detect and Prevent Black Hole Attacks in Healthcare WSN
- 8 Downloads
The black hole attack is an adverse issue in Wireless Sensor Networks (WSNs). Research for detection and circumvention of the black hole attack is underway. However, the false alarm rate, amount of time required to identify the black hole attack nodes in network has not reduced. To overcome such limitations, the Jensen–Shannon Divergence Based Independent Component Analysis (JDICA) technique is proposed in this paper. This technique is introduced with the application of Jensen–Shannon Divergence estimation in Independent Component Analysis model on the contrary to existing works, in order to achieve higher black hole detection accuracy in healthcare WSN. The JDICA technique identifies the black hole attack by analyzing the physiological data gathered from biomedical sensors. The proposed JDICA technique carries out attack detection based on sensor nodes behaviors such as energy, trust and cooperative count. It determines the dependence among the nodes, based on the independent probability distribution functions and mutual probability function by using the Jensen–Shannon Divergence. The divergence result enables JDICA technique to detect black hole attacks with greater accuracy, and helps to quarantine the malicious node from the network by broadcasting the isolation message to all sensor nodes in the network. Hence, JDICA technique enhances the detection of black hole attack nodes as compared to state-of-the-art works, thereby increasing the packet delivery ratio and reducing delay. The JDICA technique simulation is done considering the metrics such as detection rate, detection time, false alarm rate, and packet delivery ratio with respect to a varied number of sensor nodes and data packets. Simulation results makes it apparent that the JDICA technique improves the detection rate and minimizes the detection time of the black hole attack when compared to state-of-the-art works.
KeywordsBlack hole attack Cooperative count Energy Healthcare WSN Isolation Jensen–Shannon Divergence Sensor node Trust value
- 3.Pavan Kumar Guptha, Y., & Madhu, M. (2017). Improving security and detecting black hole attack in wireless sensor network. International Journal of Professional Engineering Studies, 8(5), 260–265.Google Scholar
- 7.Pathak, G. R., Patil, S. H., & Tryambake, J. S. (2014). Efficient and trust based black hole attack detection and prevention in WSN. International Journal of Computer Science and Business Informatics, 14(2), 93–103.Google Scholar
- 9.Taylor, V. F., & Fokum, D. T. (2014). Mitigating black hole attacks in wireless sensor networks using node-resident expert systems. In 2014 wireless telecommunications symposium (pp. 1–7). IEEE.Google Scholar
- 11.Sonal, Kiran Narang. (2013). Black hole attack detection using fuzzy logic. International Journal of Science and Research (IJSR), 2(8), 222–225.Google Scholar
- 13.Virmani, D., Soni, A., & Batra, N. (2014). Reliability analysis to overcome black hole attack in wireless sensor network. arXiv preprint arXiv:1401.2540.
- 14.Karuppiah, A. B., Dalfiah, J., Yuvashri, K., & Rajaram, S. (2015). An improvised hierarchical black hole detection algorithm in wireless sensor networks. In International confernce on innovation information in computing technologies (pp. 1–7). IEEE.Google Scholar
- 17.Aljumah, A., & Ahanger, T. A. (2017). Futuristic method to detect and prevent blackhole attack in wireless sensor networks. International Journal of Computer Science and Network Security (IJCSNS), 17(2), 194.Google Scholar