• Corpus ID: 6169736

Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks

@inproceedings{Karakehayov2005UsingRT,
  title={Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks},
  author={Zdravko Karakehayov},
  year={2005}
}
This paper describes REWARD, a novel routing algorithm for wireless sensor networks. The algorithm is adjustable and can wage counter attacks against either single black holes or teams of malicious nodes. The proposed routing technique is suitable for network nodes that can tune their transmit power. REWARD forwards packets using geographic routing. The algorithm utilizes two types of broadcast messages, MISS and SAMBA, to organize a distributed data base for detected black hole attacks. MISS… 

Figures from this paper

Mitigating black hole attacks in wireless sensor networks using node-resident expert systems

TLDR
A robust and flexible attack detection scheme that uses a watchdog mechanism and lightweight expert system on each node to detect anomalies in the behaviour of neighbouring nodes is proposed, even if malicious nodes are inserted into the network.

BFO Based Optimized Positioning For Black Hole Attack Mitigation in WSN

TLDR
This paper proposes an efficient technique that uses multiple base stations to be deployed randomly in the network to counter the impact of black holes on data transmission and can be used to identify 100% black hole nodes with almost negligible false positives.

Detecting Black Hole Attacks in Wireless Sensor Networks using Mobile Agent

TLDR
A simulation-based model of the proposed lightweight, fast, efficient and mobile agent technology based security solution against black attack for wireless sensor networks (WSNs), which has a dynamic topology, intermittent connectivity, and resource constrained device nodes is implemented.

Counter Effects of Black Hole Attack on Data Transmission in Wireless Sensor Network with Multiple Base Stations

TLDR
This work proposes an efficient technique that uses multiple base stations deployed in the network to reduce the impact of black holes on data transmission and simulation results prove that the scheme achieves the 99% packet delivery success and the 100% black hole node detection.

Security against Black Hole Attack in Wireless Sensor Network - A Review

TLDR
This paper is suggesting some feasible security model to further enhancement to tackling of black hole attack in the wireless sensor network and elaborates security againstblack hole attack.

Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN

TLDR
Simulation results signify that the proposed protocol performs satisfactorily in secure routing and is robust against both single and cooperative Black Hole attacks in a dynamic environment.

Detection of Grouped Malicious Nodes to Avoid Black Hole Attack in Mobile Ad-Hoc Network

TLDR
An algorithmic approach to focus on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET and capable of detecting & removing Black hole node(s) in the MANET at the beginning and a solution to discover a safe route avoiding cooperative black hole attack.

Avoidance of Black Hole Attack in Virtual Infrastructure for MANET

TLDR
An algorithmic approach to focus on analyzing and improving the security of AODV, which is one of the popular routing protocols for MANET, is given, on ensuring the security against Black hole attack.

A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks

  • B. PatelAshish Patel
  • Computer Science
    2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE)
  • 2016
TLDR
The literature review of detection and prevention of black hole and wormhole attack is made and the trust based mechanism for detection of worm hole attack that is already simulated for black hole attack is proposed.

Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations

TLDR
A lightweight and fast mobile agent technology based security solution against cloning attack, sinkhole attack and black hole attack for wireless sensor networks (WSNs) using mobile agents is proposed.
...

References

SHOWING 1-10 OF 21 REFERENCES

Routing security in wireless ad hoc networks

TLDR
This article studies the routing security issues of MANETs, and analyzes in detail one type of attack-the "black hole" problem-that can easily be employed against the MANets, and proposes a solution for the black hole problem for ad hoc on-demand distance vector routing protocol.

A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks

TLDR
A DOS attack taxonomy is presented to identify the attacker, his capabilities, the target of the attack, vulnerabilities used, and the end result, and to survey vulnerabilities in WSNs and give possible defenses.

Mitigating routing misbehavior in mobile ad hoc networks

TLDR
Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.

Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks

TLDR
A randomized algorithm where coordinators rotate with time is given, demonstrating how localized node decisions lead to a connected, capacity-preserving global topology.

Design of Distributed Sensor Networks for Security and Defense

TLDR
The analysis shows that low-power design at all phases, from nodes location through computation and communication, is crucial for reliable operation and sufficient lifetime.

Opportunistic routing in multi-hop wireless networks

TLDR
Extremely Opportunistic Routing is described, a new unicast routing technique for multi-hop wireless networks that reduces the total number of transmissions by nearly a factor of two over the best possible pre-determined route.

A dual-space approach to tracking and sensor management in wireless sensor networks

TLDR
A dual-space approach to event tracking and sensor resource management in sensor networks, which maps a non-local phenomenon to a single point in the dual space, and maps locations of distributed sensor nodes to a set of lines that partitions theDual space.

A scalable location service for geographic ad hoc routing

TLDR
GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale to a larger number of nodes than possible with previous work, and compares favorably with Dynamic Source Routing.

Energy Efficient Routing in Wireless Sensor Networks

TLDR
In this paper, it is shown that in order to find the routes that give energy efficiency, a set of partial differential equations similar to the Maxwell's equations in the electrostatic theory can be solved.

PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking

TLDR
The authors present a configurable architecture that enables these opportunities to be efficiently realized in silicon and believe that this energy-conscious system design and implementation methodology will lead to radio nodes that are two orders of magnitude more efficient than existing solutions.