Improving Security and Packet Delivery against Black Hole Attacks with Multiple Base Station in Wireless Sensor Network

Bhosale Bhagyashali Keshav


Wireless sensor network (WSN) is comprised of a
large number of sensors that collaboratively monitor various
environments which sense and forward temperature, humidity,
etc. In WSN, Black hole attack is occurred when adversary
or intermediary captures the node they do not transmit data
to next node instead of that they transmit wrong/false event
information to the base station. Literature study has been
proved the 100attack and 99in presence of black hole attack
by allowing packet transmission to other base station where
base stations are deployed at various places. Our focus is on
successful data delivery at multiple base stations. In this paper
we have been proved the 100station by implementing lightweight
security model. We analyze Tiny Encryption Algorithm from
literature survey which deals with authentication, encryption and
decryption yields feasible solution for wireless sensor networks.

Full Text:



Satyajayant Misra, Kabi Bhattarai and Guoliang Xue, BAMBi: Blackhole

attacks mitigation with multiple base stations in wireless sensor networks,

publication in the IEEE ICC 2011 proceedings.

Z. Karakehayov. Using REWARD to detect team black-hole attacks in

wireless sensor networks, In ACM Workshop on Real- World Wireless

Sensor Networks, 2005.

B.J. Culpepper, H.C. Tseng, Sink hole intrusion indicators in DSR

MANETs, Proceeding of International Conference Broad Band Networks.

PP, 681-688, 2004.

T. Shu, S. Liu, and M. Krunz. Secure data collection in wireless sensor

networks using randomized dispersive routes. In IEEE INFOCOM, pages

, 2009.

C. Karlof and D. Wagner. Secure routing in wireless sensor networks:

Attacks and countermeasures. Elseviers Ad Hoc Networks Journal, Special

Issue on Sensor Network Applications and Protocols, 1(2 3):293315,

September 2003.

S. Roy, S. Singh, S. Choudhary, and N. Debnath. Countering sinkhole and

black hole attacks on sensor networks using dynamic trust management.

In IEEE Symposium on Computers and Communications, pages 537542,

Elias Yarrkov, Cryptanalysis of XXTEA May 4, 2010.

Sadaqat Ur Rehman et al., Comparison Based Analysis of Different

Cryptographic and Encryption Techniques Using Message Authentication

Code(MAC) in Wireless Sensor Networks (WSN), IJCSI International

Journal of Computer Science Issues, Vol. 9, Issue 1, No 2, ISSN (Online):

-0814, Jan 2012.

I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless

sensor networks: A survey, Computer Networks, 38(4):393422, 2002.

R. M. Needham, D.J. Wheeler, Correction to xtea, Computer

Laboratory, University of Cambridge, October98, available at, 1998.

Shuang Liu, Olga V. Gavrylyako, Phillip G. Bradford Implementing

the TEA algorithm on Sensors ACMSE 04, April 23, 2004, Huntsville,

Alabama USACopyright 2004 ACM 158113870-9/04/04.

Jongdeog Lee, Krasimira Kapitanova, Sang H. Son The price of

security in wireless sensor networks, Computer Network (2010),

doi:10.1016/j.comnet.2010.05.011, et,

Devesh Jinwala, Dhiren Patel, Kankar Dasgupta, Optimizing the block

cipher and modes of operations overhead at the link layer security

framework in the wireless sensor networks, in: ICISS, pp. 258272, 2008.

Mohan C Nikam, B. K. Mishra, Prashant Lakkadwala 2014, Security

against Black Hole Attack in Wireless Sensor Network - A Review, In

Proceedings of the 2014 Fourth international Conference on Communication

Systems and Network Technologies (April 07 - 09, 2014), IEEE

Computer Society, Washington, DC, 615-620.


  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology