Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

Wireless sensor networks have millions of sensors, which cooperate with one on other in home automation, military surveillance, entity tracking systems and several other applications. In these networks, multicast is the basic routing service for efficient data broadcasting for task assignment, targeted queries and code updates. The sensor nodes have low computational capabilities, and are highly resource-constrained. So, the multicast routing protocols of wireless sensor networks are prone to various routing attacks, such as black hole, rushing, wormhole and denial of service attacks. The objective of this paper is to study the effects of the black hole and rushing attack on the location based Geographic multicast routing (GMR) protocol. The NS-2 based simulation is used in analyzing the black hole and rushing attacks on the GMR. The black hole and rushing attack degrades the network performance by 26% and 18% respectively.

Keywords

Wireless sensor networks geographic multicast routing black hole attack rushing attack joules and throughput 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Prathapani, A., Santhanam, L., Agrawal, D.P.: Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents. The Journal of Supercomputing, 1–28 (2010) (online First)Google Scholar
  2. 2.
    Krishnan, A., Manjunath, A., Reddy, G.J.: Retracted: A New Protocol to Secure AODV in Mobile AdHoc Networks. Communications in Computer and Information Science 133(5), 378–389 (2011)CrossRefGoogle Scholar
  3. 3.
    Sabbah, E., Kang, K.-D.: Security in Wireless Sensor Networks Computer Communications and Networks. In: Guide to WSN, 1st edn., pp. 491–512 (2009)Google Scholar
  4. 4.
    Zhan, G., Shi, W., Deng, J.: TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks. In: Silva, J.S., Krishnamachari, B., Boavida, F. (eds.) EWSN 2010. LNCS, vol. 5970, pp. 65–80. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  5. 5.
    Nguyen, H.L., Nguyen, U.T.: A study of different types of attacks on multicast in mobile ad hoc networks. Journal on Adhoc Networks 6, 32–46 (2008)CrossRefGoogle Scholar
  6. 6.
    Hortelano, J., Calafate, C.T., Cano, J.C., de Leoni, M., Manzoni, P., Mecella, M.: Black-Hole Attacks in P2P Mobile Networks Discovered through Bayesian Filters. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6428, pp. 543–552. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. 7.
    Lin, K., Lai, C.-F., Liu, X., Guan, X.: Energy Efficiency Routing with Node Compromised Resistance in Wireless Sensor Networks, Mobile Networks and Applications, pp. 1–15 (2010) (online FirstTM)Google Scholar
  8. 8.
    Xing, K., Srinivasan, S.S.R., Jose, M., Rivera, M., Li, J., Cheng, X.: Attacks and Countermeasures in Sensor Networks: A Survey. Network Security, 251–272 (2010)Google Scholar
  9. 9.
    Xu, L., Deng, Z., Ren, W., Sch, H.W.: A Location Algorithm Integrating GPS and WSN in Pervasive Computing. Pervasive Computing and Applications, 461–466 (2008)Google Scholar
  10. 10.
  11. 11.
    Kannhavong, P., Nakayama, H., Nemoto, Y., Kato, N.: A Survey of Routing Attacks In Mobile Ad Hoc Networks. IEEE Wireless Comm. 14, 85–91 (2007)CrossRefGoogle Scholar
  12. 12.
    Sanchez, Ruiz, J.A., Stojmnenovic, P.M.: GMR: Geographic Multicast Routing for Wireless Sensor Networks. Journal on Computer Comm., 2519–2531 (2007)Google Scholar
  13. 13.
    Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y.: Detecting Black hole Attack on AODV based Mobile Ad-hoc networks by Dynamic Learning Method. International Journal of Network Sec. 5, 338–346 (2007)Google Scholar
  14. 14.
    Shyamala, R., Valli, S.: Secure route discovery in MAODV for Wireless Sensor Networks. UbiCC Journal 4, 775–783 (2009)Google Scholar
  15. 15.
    Ramachandran, S., Shanmugan, V.: Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks. Journal of Computer Science 7, 973–979 (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Department of Information TechnologyUniversity College of Engineering TindivanamMelpakkamIndia
  2. 2.Department of Computer Science and EngineeringAnna UniversityChennaiIndia

Personalised recommendations