Analysis of Black Hole Attacks on Wireless Sensor Networks
AUTHORS
K. Varaha Samba Murthy Raju,Dept. of Computer Science & Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
Y Bhargavi,Dept. of Computer Science & Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
ABSTRACT
Wireless sensing element networks contains of assorted variety of freelance sensing element units and nodes that were accustomed to monitor and live the physical properties of assorted devices and conjointly the temperature and its connected measurements etc. The key applications of those units square measure the military, setting, unsafe places wherever it’s troublesome for the masses to enter. A number of the necessary restrictions or the bounds of a sensing element network which is able to play a significant role on the performance of those kinds of networks. By considering these drawbacks, the sensing element networks is simply attacked by different devices or the different set of users within the same networks or other set of networks. This type of attacks within the wireless sensing element networks was thought of here and therefore the performance of the networks below these attacks was simulated by victimization the NS2 machine. When simulation, the result shows that the performance of the network may well be influenced by the presence of assorted set of attacks within the networks. Conjointly the importance was given to the amount of nodes being attacked during a single network.
KEYWORDS
Black hole attacks, Wireless sensor networks, NS 2 simulator
REFERENCES
[1] Prabhakar. M. Kuldeep Sharma, and Neha Khandelwal, “An overview of security problems in MANET,” Oriental journal of computer science and technology, vol.10, pp.82-85, (2016)
[2] Li, Wenjia, Joshi, and Anupam., “Security issues in mobile ad hoc networks -a survey,” White House Papers Graduate Research in Informatics at Sussex, vol.17, pp.1-6, (2008)
[3] Arya Chandrakala and Arya Shobha, “Malicious nodes detection in mobile ad hoc networks,” journal of Information and Operations Management, vol.3, no.1, pp. 210-212, (2015)
[4] Ghansela Siddharth, “Network security: Attacks, tools and techniques,” IJARCSSE, June, vol.3, no.6, pp.1-6, (2013)
[5] Chang R-S and Ting H-C, “Improving the performance of broadcasting in ad hoc wireless networks,” Journal of Internet Technology, vol.4, no.4, pp.209-216, (2003)
[6] Yang H, Lou H, Ye F, Lu S, and Zhang L, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless Communications, vol.11, no.1, pp.38-47, (2004)
[7] Marti S, Giuli TJ, Lai K, and Baker M., “Mitigating routing misbehavior in mobile ad hoc networks,” Paper presented at the 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, August, vol.10, no.4, pp.6-11, (2000)
[8] Yang S-J and Lin Y-C, “Static and dynamic RED tuning for TCP performance on the mobile ad hoc networks,” Journal of Internet Technology, vol.10, no.1, pp.13-21, (2009)