Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks
Wireless sensor networks have millions of sensors, which cooperate with one on other in home automation, military surveillance, entity tracking systems and several other applications. In these networks, multicast is the basic routing service for efficient data broadcasting for task assignment, targeted queries and code updates. The sensor nodes have low computational capabilities, and are highly resource-constrained. So, the multicast routing protocols of wireless sensor networks are prone to various routing attacks, such as black hole, rushing, wormhole and denial of service attacks. The objective of this paper is to study the effects of the black hole and rushing attack on the location based Geographic multicast routing (GMR) protocol. The NS-2 based simulation is used in analyzing the black hole and rushing attacks on the GMR. The black hole and rushing attack degrades the network performance by 26% and 18% respectively.
KeywordsWireless sensor networks geographic multicast routing black hole attack rushing attack joules and throughput
Unable to display preview. Download preview PDF.
- 1.Prathapani, A., Santhanam, L., Agrawal, D.P.: Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. The Journal of Supercomputing, 1–28 (2010) (online First)Google Scholar
- 3.Sabbah, E., Kang, K.-D.: Security in Wireless Sensor Networks Computer Communications and Networks. In: Guide to WSN, 1st edn., pp. 491–512 (2009)Google Scholar
- 6.Hortelano, J., Calafate, C.T., Cano, J.C., de Leoni, M., Manzoni, P., Mecella, M.: Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6428, pp. 543–552. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 7.Lin, K., Lai, C.-F., Liu, X., Guan, X.: Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks, Mobile Networks and Applications, pp. 1–15 (2010) (online FirstTM)Google Scholar
- 8.Xing, K., Srinivasan, S.S.R., Jose, M., Rivera, M., Li, J., Cheng, X.: Attacks and Countermeasures in Sensor Networks: A Survey. Network Security, 251–272 (2010)Google Scholar
- 9.Xu, L., Deng, Z., Ren, W., Sch, H.W.: A Location Algorithm Integrating GPS and WSN in Pervasive Computing. Pervasive Computing and Applications, 461–466 (2008)Google Scholar
- 12.Sanchez, Ruiz, J.A., Stojmnenovic, P.M.: GMR: Geographic Multicast Routing for Wireless Sensor Networks. Journal on Computer Comm., 2519–2531 (2007)Google Scholar
- 13.Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Black hole Attack on AODV based Mobile Ad-hoc networks by Dynamic Learning Method. International Journal of Network Sec. 5, 338–346 (2007)Google Scholar
- 14.Shyamala, R., Valli, S.: Secure route discovery in MAODV for Wireless Sensor Networks. UbiCC Journal 4, 775–783 (2009)Google Scholar