Abstract
Wireless sensor systems (WSN) have turned into a developing zone of innovative work because of the huge number of uses that can significantly profit by such frameworks and has lead to the advancement of minor, modest, expendable and independent battery controlled sensor nodes. One of the real challenges of WSN is security. The issue of security is because of the remote idea of the sensor systems and the natural power and battery constraints of sensor nodes make common security arrangements which are unfeasible. In this manner, the system is vulnerable to attacks by cruel routes and the information is dropped in attacks like blackhole attack. In this paper, it is proposed to assess the presentation of a system under the effect of hierarchical cluster-based data dissemination (HCDD) convention with Markov model of inductive routes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Tripathi A, Mohapatra AK (2016) Mitigation of blackhole attack in MANET. In: 8th international conference on computational intelligence and communication networks
Patel HB, Jinwala DC (2019) Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach. In: TENCON 2019—2019 IEEE Region 10 conference
Saravanan T (2014) An efficient multi channel query scheduling in wireless sensor networks in IJCSNS. Int J Comput Sci Network Secur 14(2):71–77
El-Semary AM, Diab H (2019) BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. In: IEEE Access 2019
Sharma DK, Ahmad MS, Kshitij Sharma GH (2018) Performance analysis of opportunistic network protocols in blackhole environment. In: Second international conference on inventive communication and computational technologies
Elmahdi E, Yoo S-M, Sharshembiev K (2018) Securing data forwarding against blackhole attacks in mobile ad hoc networks. In: IEEE 8th annual computing and communication workshop and conference
Kshirsagar D, Patil A (2013) Blackhole attack detection and prevention by real time monitoring. In: Fourth international conference on computing. Communications and Networking Technologies
Bala A, Bansal M, Singh J (2009) Performance analysis of MANET under blackhole attack. In: First international conference on networks and communications
Saravanan T, Nithya NS (2018) Integrating wireless sensor networks with mobile application. Int J Eng Res Technol (IJERT) 6(8):1–3
Mohite VG, Ragha L (2015) Security agents for detecting and avoiding cooperative blackhole attacks in MANET. In: International conference on applied and theoretical computing and communication technology
Patidar K, Dubey V (2014) Modification in routing mechanism of AODV for defending blackhole and wormhole attacks. In: Conference on IT in business, industry and government
Mukesh Tiwari KV, Arya R, Choudhari KSC (2009) Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information. In: Fourth international conference on computer sciences and convergence information technology
Wazid M, Katal A, Sachan RS, Goudar RH, Singh DP (2013) Detection and prevention mechanism for blackhole attack in wireless sensor network. In: International conference on communication and signal processing (2013)
Meenakshi Tripathi MS, Laxmi GV (2013) Comparing the impact of black hole and gray hole attack on LEACH in WSN. In: Procedia computer science 19:1101–1107 (2013)
Sheela D, Mahadevan G (2012) Mollifying the effect of cloning, sink hole and black hole attacks in wireless sensor networks using mobile agents with several base stations. Int J Comput Appl
Gondwal N, Diwaker C (2013) Detecting Blackhole attack in WSN by check agent using multiple base stations. Am Int J Res Sci Technol Eng Math (2013)
Yadav P, Gill RK, Kumar N (2012) A fuzzy based approach to detect black hole attack. Int J Soft Comput Eng
Dighe PG, Vaidya MB (2013) Counter effects of black hole attack on data transmission in wireless sensor network with multiple base stations. Int J Eng Innovat Technol (2013)
Zhang J (2008) Black hole quantum tunnelling and black hole entropy correction. Phys Lett B(2008)
Lin K, Yang SZ (2009) Fermions tunneling of higher-dimensional Kerr–Anti-de Sitter black hole with one rotational parameter. Phys Lett B
Morris S, Shin HS (2004) Liquidity black holes. Rev Finance 8(1):1–18
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saravanan, T., Sasikumar, P. (2021). Assessment and Analysis of Action Degeneracy Due to Blackhole Attacks in Wireless Sensor Networks. In: Mahapatra, R.P., Panigrahi, B.K., Kaushik, B.K., Roy, S. (eds) Proceedings of 6th International Conference on Recent Trends in Computing. Lecture Notes in Networks and Systems, vol 177. Springer, Singapore. https://doi.org/10.1007/978-981-33-4501-0_33
Download citation
DOI: https://doi.org/10.1007/978-981-33-4501-0_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4500-3
Online ISBN: 978-981-33-4501-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)