Efficient WSN through Blackhole Identification and Elimination

Authors

  • Merlin Mary James  Department of CSE, Mangalam College of Engineering, Kerala, India
  • Vinodh P Vijayan  Department of CSE, Mangalam College of Engineering, Kerala, India
  • Neena Joseph  Department of CSE, Mangalam College of Engineering, Kerala, India
  • Neethu Maria John  Department of CSE, Mangalam College of Engineering, Kerala, India

Keywords:

Blackhole Identification, classification, throughput, routing overhead

Abstract

Some wi-fi sensor community is historically is used to acquire information shape remote/unmanned vicinity. Always cognizance on community insist on precisions facts collection. Traditionally all sensor network layout deal with demanding situations like insurance, lifetime and routing related troubles. Due to the huge spread software of senor community, it is commenced the use of in many important application like defence, atomic reactor, national security and many others. Wherein data safety turn out to be vital than other parameters. Blackhole assault is one of the attack assault that could spread the device with unsuitable information, as a result the complete machine come to be out of date. A consider rating primarily based blackhole assault identity can be implemented and affected nodes can be recognized. Eliminating such black hole nodes from network can also increase routing overhead but it constantly beautify throughput of community since the community bring any fruitful records.

References

  1. Shalli Rani, Syed Hassan Ahmed, Rajneesh Talwar, and Jyoteesh Malhotra, “Can Sensors Collect Big Data? An Energy Efficient Big Data Gathering Algorithm for WSN”, IEEE Transactions on Industrial Informatics Volume: 13, Issue: 4 , Aug. 2017,Page(s): 1961 – 1968https://doi.org/10.1109/TII.2017.2656899
  2. C. Caione, D. Brunelli, and L. Benini, “Distributed compressive sampling for lifetime optimization in dense wireless sensor networks”, IEEE Trans. Ind. Informat. vol. 8, no. 1, pp. 3040, Feb. 2012.https://doi.org/10.1109/TII.2011.2173500
  3. J. Peng, X. H. Chen, and T. Liu, “A flow- partitioned unequal clustering routing algorithm for wireless sensor networks”, Int. J. Distrib. Sensor Netw., vol. 2014, 12 pp., 2014,Article ID 875268 https://doi.org/10.1155/2014/875268
  4. A. E. Tmer and M. Gndz,“Energy- efficient and fast data gathering protocols for indoor wireless sensor networks”, Sensors, vol. 10, pp.80548069, 2010.https://doi.org/10.3390/s100908054
  5. S.Rani, S.H.Ahmed, “Multi-hop Routing in Wireless Sensor Networks An overview, taxonomy and research challenges”, ISBN. 978- 981-287730-7, 2016https://doi.org/10.1007/978-981-287-730-7
  6. Nikolaos A Pantazis, Stefanos A Nikolidakis and Dimitrios D Vergados, “Energy Efficient Routing Protocol in Wireless Sensor Network: A survey”, IEEE Communications Surveys & Tutorials, Vol. 15, 2013. https://doi.org/10.1109/SURV.2012.062612.00084
  7. Mandeep Thakur,Amninder Kaur, “Blackhole Attack Detection Techniques in WSN: A Review”,International Journal of Advanced Research in Computer Science and Software Engineering, Volume 7, Issue 4, April 2017 https://doi.org/10.23956/ijarcsse/V7I4/0225
  8. Sachin Lalar,Monika,Arun Kumar Yadav, “Effect of Black Hole Attacks on Wireless Sensor Networks”Internationa Journals of Advanced Research in Computer Science and Software Engineering Volume-7, Issue-7 https://doi.org/10.23956/ijarcsse/V7I7/0189
  9. Yuxin Liu, Mianxiong Dong, Member, Kaoru, Ota, Anfeng Liu,“ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks”IEEE Transactions on Information on Forensics and Security, Vol: 11 Sept. 2016, Page(s): 2013 – 2027https://doi.org/10.1109/TIFS.2016.2570740

Downloads

Published

2018-11-30

Issue

Section

Research Articles

How to Cite

[1]
Merlin Mary James, Vinodh P Vijayan, Neena Joseph, Neethu Maria John, " Efficient WSN through Blackhole Identification and Elimination, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.454-459, November-December-2018.