A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol

Ghugar, Umashankar, Pradhan, Jayaram and Biswal, Monalisa A Novel Intrusion Detection System for Detecting Black Hole Attacks in Wireless Sensor Network using AODV Protocol. IJCSN - International Journal of Computer Science and Network, 2016, vol. 5, n. 4. [Journal article (Unpaginated)]

[thumbnail of A-Novel-Intrusion-Detection-System-for-Detecting-Black-Hole-Attacks-in-Wireless-Sensor-Network-using-AODV-Protocol.pdf] Text
A-Novel-Intrusion-Detection-System-for-Detecting-Black-Hole-Attacks-in-Wireless-Sensor-Network-using-AODV-Protocol.pdf - Published version

Download (289kB)
[thumbnail of A-Novel-Intrusion-Detection-System-for-Detecting-Black-Hole-Attacks-in-Wireless-Sensor-Network-using-AODV-Protocol.pdf] Text
A-Novel-Intrusion-Detection-System-for-Detecting-Black-Hole-Attacks-in-Wireless-Sensor-Network-using-AODV-Protocol.pdf

Download (289kB)

English abstract

Wireless Sensor Networks (WSN) has wide application in data gathering and data transmission as per the user’s requirement and it consist of number of nodes. These nodes have limited battery power, limited resources and limited computational power .Due to all these factors, WSN faces more security threats. Security issues are a vital problem to be solved in Wireless Sensor networks (WSNs). Different types of intrusion detection systems (IDS) are developed to make WSN more secure. In this paper the proposed IDS are based on watchdog monitoring technique and are able to detect Black Hole attacks using AODV (Ad- Hoc On-Demand Distance Vector) Protocol. Besides, the betterment that makes watchdog monitoring technique more reliable are described and the results of simulations of the IDS on NS-2 simulator are presented.

Item type: Journal article (Unpaginated)
Keywords: AODV; RREQ; RREP; IDS; PDR; DSR
Subjects: L. Information technology and library technology > LH. Computer and network security.
Depositing user: IJCSN Journal
Date deposited: 29 Oct 2016 02:25
Last modified: 29 Oct 2016 02:25
URI: http://hdl.handle.net/10760/30158

References

[1] M. Tiwari, K.Veer Arya, R. Choudhari, K. Sidharth Choudhary, “Designing Intrusion Detection to Detect Black hole and Selective Forwarding Attack in WSN based on local Information”, “2009 Fourth International Conference on Computer Sciences and Convergence Information Technology” [2] E. Nam Huh and T. Hong Hai, “Lightweight Intrusion Detection for Wireless Sensor Networks” [3] J. Du, J. Li, “ A Study of Security Routing Protocol For Wireless Sensor Network”, “2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control” [4] F. Bao, I. Ray Chen, M. Jeong Chang, and J.-Hee Cho, “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection”, “IEEE Transactions On Network And Service Management, June 2012” [5] M. A. Rassam, M.A. Maarof and A. Zainal, “A Survey of Intrusion Detection Schemes in Wireless Sensor Networks”, “American Journal of Applied Sciences, 2012” [6] W. Ribeiro Pires J´unior, T. H. de Paula Figueiredo H. Chi Wong, A. A.F. Loureiro, “Malicious Node Detection in Wireless Sensor Networks”, “Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS’04),IEEE 2004” [7] V. K. Jatav, M. Tripathi , M S Gaur and V. Laxmi, “Wireless Sensor Networks: Attack Models and Detection”, “2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) © (2012) IACSIT Press, Singapore” [8] A. Paula R. da Silva, M.H.T. Martins Bruno, P.S. Rocha, A. A.F. Loureiro, L. B. Ruiz, H. Chi Wong, “Decentralized intrusion detection in wireless sensor networks”, “Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, 2005”. [9] G..Saravanan, P. R.Patil, M.R. Kumar, “Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing”, “IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278- 0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. I (Mar-Apr. 2014), PP 26-31” [10] K Abd. Jalil, Z. Ahmad, J. Lail Ab Manan , “Mitigation of Black Hole Attacks for AODV Routing Protocol”, “International Journal on New Computer Architectures and Their Applications (IJNCAA) The Society of Digital Information and Wireless Communications, 2011” [11] S. Nishanthi “Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm”, “International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013” [12] Geethu P C, R. Mohammed A, “Defense Mechanism against Selective Forwarding Attack in Wireless Sensor Networks”, “4th International Conference on Computing, Communications and Networking Technologies-2013”. [13] Krontiris, I., T. Dimitriou and F.C. Freiling, “Towards intrusion detection in wireless sensor networks.”, “Proceeding of the 13th European Wireless Conference, 2007”. [14] T. Singh, H. Kaur Arora “Detection and Correction of Sinkhole Attack with Novel Method in WSN Using NS2 Tool”, “International Journal of Advanced Computer Science and Applications, 2013” [15] M. Bahekmat, M. Hossein Yaghmaee, A. Sadat Heydari Yazdi, and S. Sadeghi, “A Novel Algorithm for Detecting Sinkhole Attacks in WSNs”, “International Journal of Computer Theory and Engineering, June 2012” [16] M. Al-Shurman and Seong-Moo Yoo, S. Park, “Black Hole Attack in Mobile Ad Hoc Networks”, “Association for Computing Machinery Southeast Conference, April 2004” [17] Kumar, V.: Simulation and Comparison of AODV and DSR Routing Protocols in MANETs, Master Thesis (2009). [18] Ei Ei Khin and Thandar Phyu,” IMPACT OF BLACKHOLE ATTACK ON AODV ROUTING PROTOCOL”, “International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No.2, May 2014.” [19] H.Debar,M Dacier and A.Wepsi, 1999,”Towards Taxonomy of Intrusion Detection System.Computer network,31:805-822. [20] P.Butch and C.Ko ”Challenges in Intrusion Detection for wireless Sensor Networks”, In Proceeding of application and the Internet Workshop.2003 symposium on.pp.368378.2003”. [21] Ei Ei Khin and T.Phyu” Mitigating Scheme for Black Hole Attack in AODV Routing Protocol” ,International Conference on Advances in Engineering and Technology (ICAET'2014) March 29-30, 2014 Singapore. [22] Ei Ei Khin and T.Phyu” Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET” International Journal of Computer Science and Business Informatics. [23] M. Mohanapriya , Ilango Krishnamurthi” Modified DSR protocol for detection and removal of selective black hole attack in MANET”, Computers and Electrical Engineering 40 (2014) 530–538.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item