Mitigation of Black Hole and Selective Forwarding Attacks through Active Trust Mechanisms in Wireless Sensor Networks

Authors

  • Mohammad Sirajuddin  Research Scholar, Department of Computer Science & Engineering, JNTU, Hyderabad, Telangana, India
  • Dr. B. Sateesh Kumar  Professor, Department of Computer Science & Engineering, JNTUH-College of Engineering, Jagitial, Telangana, India

DOI:

https://doi.org/10.32628/CSEIT2390395

Keywords:

Black-Hole Attacks, Dos Attacks, WSN Security, Trust Metrics

Abstract

In modern times, security remains a significant concern in wireless networks. Wireless sensor networks are widely employed in different practical situations. WSNs struggle with numerous internal and external threats, and detecting and defending against insider attacks is difficult. Insider attacks, in which intruders discard received data packets selectively, pose a significant risk to WSNs. The presence of black hole nodes within the network causes this issue. This research paper presents a secure and reliable route management methodology for WSNs that selects nodes and routing paths based on trust metrics. The proposed mechanism employs intelligent routing and node selection to defend against various types of assaults encountered during the routing process, including selective forwarding and black hole attacks. As a result, the paper identifies secure routes and establishes secure network routing. This scheme uses throughput, latency, and packet drop ratio as performance metrics. Experimentation demonstrates that the proposed system effectively increases the probability of secure network routing paths while extending the network lifecycle.

References

  1. Khattak, Hasan Ali Fang, Weidong Zhang, Wuxiong Chen, Wei Pan, Tao Ni, Yepeng Yang, Yinxuan 2020 Trust-Based Attack and Defense in Wireless Sensor Networks:ASurvey ISSN: 1530-866 https://doi.org/10.1155/2020/2643546.
  2. Hasan, A.; Khan, M.A.; Shabir, B.; Munir, A.; Malik, A.W.; Anwar, Z.; Ahmad, J. Forensic Analysis of Black-hole Attack in Wireless Sensor Networks/Internet of Things. Appl. Sci. 2021, 12, 11442. https://doi.org/10.3390/app122211442.
  3. Sirajuddin, M., Sateesh Kumar, B. (2022). Collaborative SecuritySchemes for Wireless Sensor Networks. In: Kumar, A., Mozar, S.(eds) ICCCE 2021. Lecture Notes in Electrical Engineering, vol828, 2022. Springer, Singapore. https://doi.org/10.1007/978-981-16-7985-8_36
  4. M. Sirajuddin and B. S. Kumar, "Efficient and Secured Route Management Scheme Against Security Attacks in Wireless Sensor Networks," 2021 Second International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2021, pp. 1045-1051, doi: 10.1109/ICESC51422.2021.9532779.
  5. Chaudhry, Shehzad Ashraf Farahani, Gholamreza " Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks"Security and Communication Networks ISSN:8814141- https://doi.org/10.1155/2021/8814141.
  6. Preventing Black Hole Attack in Wireless Sensor Network Using HMM, Procedia Computer Science, volume 148, pages 552-561, 2019,THE SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES, ICDS2018,issn 1877-0509, https://doi.org/10.1016/j.procs.2019.01.028,HananeKalkha and Hassan Satori and Khalid Satori.
  7. Md Ibrahim Talukdar, Rosilah Hassan, Md Sharif Hossen, Khaleel Ahmad, Faizan Qamar, Amjed Sid Ahmed, "Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature", Wireless Communications and Mobile Computing, vol. 2021, Article ID 6693316, 13 pages, 2021. https://doi.org/10.1155/2021/6693316.
  8. L.Sujihelen, Rajasekhar Boddu, S. Murugaveni, Ms. Arnika, AnandakumarHaldorai, Pundru Chandra Shaker Reddy, Suili Feng, Jiayin Qin, "Node Replication Attack Detection in Distributed Wireless Sensor Networks", Wireless Communications and Mobile Computing, vol. 2022, Article ID 7252791, 11 pages, 2022. https://doi.org/10.1155/2022/7252791.
  9. Hasan, A.; Khan, M.A.; Shabir, B.; Munir, A.; Malik, A.W.; Anwar, Z.; Ahmad, J. Forensic Analysis of Black-hole Attack in Wireless Sensor Networks/Internet of Things. Appl. Sci. 2021, 12, 11442. https://doi.org/10.3390/ app122211442.
  10. Ankit Kumar, Vijayakumar Varadarajan, Abhishek Kumar, Pankaj Dadheech, Surendra Singh Choudhary, V.D. Ambeth Kumar, B.K. Panigrahi, Kalyana C. Veluvolu,Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm,Microprocessors and Microsystems, Volume 80,2021, 103352,ISSN 0141-9331,https://doi.org/10.1016/j.micpro.2020.103352.
  11. Mehetre, D.C., Roslin, S.E. &Wagh, S.J. Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Comput 22 (Suppl 1), 1313–1328 (2019). https://doi.org/10.1007/s10586-017-1622-9.
  12. H. Ashraf, F. Khan, U. Ihsan, F. Al-Quayed, N. Z. Jhanjhi and M. Humayun, "MABPD: Mobile Agent-Based Prevention and Black Hole Attack Detection in Wireless Sensor Networks," 2023 International Conference on Business Analytics for Technology and Security (ICBATS), Dubai, United Arab Emirates, 2023, pp. 1-11, doi: 10.1109/ICBATS57792.2023.10111277.
  13. M. Kumar and J. Ali, "Adaptive Taylor-Sail Fish Optimization based deep Learning for Detection of Black Hole and Sybil Attack in Wireless Sensor Network," 2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS), Erode, India, 2023, pp. 1237-1244, doi: 10.1109/ICSCDS56580.2023.10104946.
  14. K.Balasubadra, X. S. A. Shiny, P. P V, P. Solainayagi and S. P. Maniraj, "Hidden Markov Model with Machine Learning-Based Black hole Attack Identification in Wireless Sensor Networks," 2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), Bengaluru, India, 2023, pp. 829-833, doi: 10.1109/IITCEE57236.2023.10090993.
  15. M. A. Goumidi, N. Hadj-Said, A. B. Ali-Pacha and E. Zigh, "Detection of Malicious Nodes in WBAN using a Feed Forward Back Propagation Neural Network," 2022 International Conference of Advanced Technology in Electronic and Electrical Engineering (ICATEEE), M'sila, Algeria, 2022, pp. 1-6, doi: 10.1109/ICATEEE57445.2022.10093101.

Downloads

Published

2023-06-30

Issue

Section

Research Articles

How to Cite

[1]
Mohammad Sirajuddin, Dr. B. Sateesh Kumar, " Mitigation of Black Hole and Selective Forwarding Attacks through Active Trust Mechanisms in Wireless Sensor Networks" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 3, pp.329-337, May-June-2023. Available at doi : https://doi.org/10.32628/CSEIT2390395