Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0110

A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks  

Terence, J. Sebastian (Dept. of Computer Science and Engineering, Karunya Institute of Technology and Sciences)
Purushothaman, Geethanjali (School of Electrical Engineering, VIT)
Publication Information
Journal of Information Processing Systems / v.15, no.1, 2019 , pp. 203-216 More about this Journal
Abstract
The nature of wireless transmission has made wireless sensor networks defenseless against various attacks. This paper presents warning message counter method (WMC) to detect blackhole attack, grayhole attack and sinkhole attack in wireless sensor networks. The objective of these attackers are, to draw the nearby network traffic by false routing information and disrupt the network operation through dropping all the received packets (blackhole attack), selectively dropping the received packets (grayhole and sinkhole attack) and modifying the content of the packet (sinkhole attack). We have also attempted light weighted symmetric key cryptography to find data modification by the sinkhole node. Simulation results shows that, WMC detects sinkhole attack, blackhole attack and grayhole attack with less false positive 8% and less false negative 6%.
Keywords
Blackhole Attack; Grayhole Attack; Packet Dropping Attacks; Sinkhole Attack; Wireless Sensor Network;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks: Technology, Protocols, and Applications. Hoboken, NJ: John Wiley & Sons, 2007.
2 R. W. Anwar, M. Bakhtiari, A. Zainal, and K. N. Qureshi, "Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks," Jurnal Teknologi (Science & Engineering), vol. 78, no. 4-3, pp. 75-81, 2016.
3 C. John and C. Wahi, "Security analysis of routing protocols for wireless sensor networks," International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 4235-4242, 2016.
4 H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, 2014.   DOI
5 A. Dhaka, A. Nandal, and R. S. Dhaka, "Gray and black hole attack identification using control packets in MANETs," Procedia Computer Science, vol. 54, pp. 83-91, 2015.   DOI
6 M. Y. Su, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems," Computer Communications, vol. 34, no. 1, pp. 107-117, 2011.   DOI
7 V. Kumar and R. Kumar, "An adaptive approach for detection of blackhole attack in mobile Ad hoc network," Procedia Computer Science, vol. 48, pp. 472-479, 2015.   DOI
8 L. Sanchez-Casado, G. Macia-Fernandez, P. Garcia-Teodoro, and R. Magan-Carrion, "A model of data forwarding in MANETs for lightweight detection of malicious packet dropping," Computer Networks, vol. 87, pp. 44-58, 2015.   DOI
9 M. Mohanapriya and I. Krishnamurthi, "Modified DSR protocol for detection and removal of selective black hole attack in MANET," Computers & Electrical Engineering, vol. 40, no. 2, pp. 530-538, 2004.   DOI
10 K. Balakrishnan, J. Deng, and V. K. Varshney, "TWOACK: preventing selfishness in mobile ad hoc networks," in Proceedings of 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA, 2005, pp. 2137-2142.
11 K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007.   DOI
12 S. Madria and J. Yin, "SeRWA: a secure routing protocol against wormhole attacks in sensor networks," Ad Hoc Networks, vol. 7, no. 6, pp. 1051-1063, 2009.   DOI
13 V. Heydari and S. M. Yoo, "Lightweight acknowledgement-based method to detect misbehavior in MANETs," KSII Transactions on Internet And Information Systems, vol. 9, no. 12, pp. 5150-5169, 2015.   DOI
14 N. K. Sreelaja and G. A. Vijayalakshmi Pai, "Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks," Applied Soft Computing, vol. 19, pp. 68-79, 2014.   DOI
15 R. K. Sundararajan and U. Arumugam, "Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor network," Journal of Sensors, vol. 2015, Article ID. 203814, 2015.
16 Q. Liu, J. Yin, V. C. Leung, and Z. Cai, "FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs," IEEE Transactions on Wireless Communications, vol. 12, no. 10, pp. 5124-5137, 2013.   DOI
17 M. Sathish, K. Arumugam, S. N. Pari, and V. S. Harikrishnan, "Detection of single and collaborative black hole attack in MANET," in Proceedings of International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2016, pp. 2040-2044.
18 The Network Simulator (NS2) [Online]. Available: http://www.isi.edu/nsnam/ns/.
19 MannaSim [Online]. Available http://www.mannasim.dcc.ufmg.br/index.htm.