Computer Science ›› 2019, Vol. 46 ›› Issue (2): 102-108.doi: 10.11896/j.issn.1002-137X.2019.02.016

• Information Security • Previous Articles     Next Articles

Detection and Defense Method for Blackhole Attacks in Wireless Sensor Networks

WANG Jun1,2, ZHU Zhi-wei2, LIU Jun-jie1,2   

  1. Key Lab of Broadband Wireless Communication and Sensor Network Technology,Ministry of Education,Nanjing University of Posts and Telecommunications,Nanjing 210003,China1
    College of Telecommunications and Information Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,China2
  • Received:2018-01-09 Online:2019-02-25 Published:2019-02-25

Abstract: Wireless sensor networks(WSN) are widely used in military,production,medical and so on.Many sensor networks are deployed in hostile and open environments,so there exist a variety of threats.Blackhole attack is a typical route attack in WSNs.A malicious node claims that it has enough residual energy and it can reach the destination in one hop or claims itself to be the destination node.So the malicious node can attract other nodes to send data to it.But it will discard the packets without forwarding it which results in the “data hole”.This paper proposed a new location detection method with trapping method.A non-existent destination node is used as a bait to locate the blackhole nodes.By verifying the identity and position information of the nodes,the malicious nodes can be removed.At the same time,the algorithm adds the pre-shared symmetric key and HMAC(Hash-based message authentication code) message authentication mechanism to prevent malicious nodes from joining the network.The results of simulation based on NS2 platform show that the proposed algorithm is superior to other ones with higher detection ratio.

Key words: Blackhole attack, Routing layer attacks, WSN

CLC Number: 

  • TN915.08
[1]牟思,殷虹,苏醒.无线传感网络技术与应用[M].北京:中国水利水电出版社,2016:1-243.
[2]DAS S,MILLER D R,KAUFMAN Y,et al.Introduction to Wireless Sensor Networks[M]∥Wireless Sensor and Mobile Ad-Hoc Networks.New York:Springer,2015:1-18.
[3]ZHANG L.Research on Wireless Sensor Network Routing Protocol Based on Energy Equilibrium[C]∥International Confe-rence on Frontiers of Manufacturing Science & Measuring Technology.2017.
[4]KOZMA W,LAZOS L.REAct:resource-efficient accountability for node misbehavior in ad hoc networks based on random audits[C]∥ACM Conference on Wireless Network Security(WISEC 2009).Zurich,Switzerland,2009:103-110.
[5]GUPTA S,KAR S,DHARMARAJA S.BAAP:Blackhole at- tack avoidance protocol for wireless network[C]∥International Conference on Computer and Communication Technology.2011:468-473.
[6]WAZID M,KATAL A,SACHAN R S,et al.Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network[C]∥International Conference on Communications and Signal Processing.IEEE,2013:576-581.
[7]AAD I,HUBAUX J P,KNIGHTLY E W.Denial of service resilience in ad hoc networks[C]∥Proceedings of the 10th Annual International Conference on Mobile Computing and Networking.ACM,2004:202-215.
[8]DENG H,LI W,AGRAWAL D P.Routing security in wireless ad hoc networks[J].IEEE Communications Magazine,2002,40(10):70-75.
[9]AL-SHURMAN M,YOO S M,PARK S.Black hole attack in mobile Ad Hoc networks[C]∥Southeast Regional Conference,2004.Huntsville,Alabama,USA,2004:96-97.
[10]SHANG X H.Research on Location Algorithm of Wireless Sensor Network Based on DV-Hop[D].Jilin:Jilin University,2012.(in Chinese)
尚小航.基于DV-Hop的无线传感器网络定位算法研究[D].吉林:吉林大学,2012.
[11]LAZOS L,POOVENDRAN R,MEADOWS C,et al.Preventing wormhole attacks on wireless ad hoc networks:a graph theoretic approach[C]∥Wireless Communications and Networking Conference.2015.
[12]ABDELSHAFY M A, KING P J B.Resisting blackhole attacks on MANETs[C]∥IEEE Consumer Communications & Networking Conference.IEEE,2016:1048-1053.
[13]宋成明,赵文,常浩.计算机网络安全原理与技术研究[M].北京:中国水利水电出版社,2015.
[14]LI J,CHEN X,LI M,et al.Secure Deduplication with Efficient and Reliable Convergent Key Management[J].IEEE Transactions on Parallel & Distributed Systems,2014,25(6):1615-1625.
[1] Cheng-biao,DING Hong-wei,DONG Fa-zhi,YANG Zhi-jun, BAO Li-yong. Low-delay and Low-power WSN Clustering Algorithm Based on LEACH XIONG [J]. Computer Science, 2020, 47(1): 258-264.
[2] ZHANG Ting, ZHANG De-gan, CUI Yu-ya, CHEN Lu, GE Hui. New Method of Multi-path Reliable Transmission Based on Redundancy Strategy [J]. Computer Science, 2019, 46(11A): 363-368.
[3] WU Wei-nan, LIU Jian-ming. Dynamic Retransmission Algorithm inLow-power Wireless Sensor Networks [J]. Computer Science, 2018, 45(6): 96-99.
[4] NI Ying-bo, CHEN Yuan-yan, YE Juan, WANG Ming. Improvement of DV-Hop Algorithm Based on Multiple Communication Radii and Cosine Theorem [J]. Computer Science, 2018, 45(11A): 320-324.
[5] GE Bin, DAI Chen, JI Jie-qu and WU Bo. Grouping-based Wireless Sensor Network Multi-rounds Clustering Routing Algorithm [J]. Computer Science, 2017, 44(Z6): 305-308.
[6] WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan. Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN [J]. Computer Science, 2016, 43(7): 153-156.
[7] CAO Xiang-yi, ZENG Bi and HE Cui-hong. Research for ETX Routing Metric of RPL [J]. Computer Science, 2016, 43(4): 102-105.
[8] SUN Cong, ZHU Yi-hua, CHI Kai-kai and YUAN Li-yong. Borrowing Address within Two-hop Neighbors in Mesh Network [J]. Computer Science, 2016, 43(3): 107-112.
[9] XING Rong-hua and HUANG Hai-yan. Researches on Wireless Sensor Network Localization Based on Improved Gbest-guided Artificial Bee Colony Algorithm [J]. Computer Science, 2016, 43(12): 273-276.
[10] WANG Jun, DU Wei-qi, LIU Hui and WANG Lei. Multipath Routing Protocol Based on Braid-multipath Network Coding Model for Wireless Sensor Networks [J]. Computer Science, 2016, 43(11): 135-141.
[11] LIU Lin-feng, GUO Ping, ZHAO Juan and LI Ning. Data Collection Strategy Based on Improved LEACH Protocol [J]. Computer Science, 2015, 42(Z6): 299-302.
[12] LIU Jian-ming and ZHAO Ri-ji. Research of Wireless Sensor Network Routing Algorithm Based on Improved Ant Colony Algorithm [J]. Computer Science, 2015, 42(Z6): 107-111.
[13] CHEN Tian-tian, JIANG Bing, XUE Xiao-qing and SHA Ting-ting. Clustering Routing Algorithm for Wireless Sensor Network along River [J]. Computer Science, 2015, 42(Z11): 227-230.
[14] HU Bing SUN Zhi-xin. Overview of Time Synchronization in Wireless Sensor Networks [J]. Computer Science, 2015, 42(7): 1-4.
[15] FENG Hui-ying, ZHOU Liang and DING Qiu-lin. Data Stream and Network Coding-based Data Aggregation Algorithm in Wireless Sensor Networks [J]. Computer Science, 2015, 42(5): 136-141.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!