Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacks in Wireless Sensor Networks using Mobile Agents with Several Base Stations
نویسنده
چکیده
Three dangerous attacks in wireless sensor network is handled in this proposed security solution. This paper proposes a lightweight and fast mobile agent technology based security solution against cloning attack, sinkhole attack and black hole attack for wireless sensor networks (WSNs).Recently mobile agents have been proposed in wireless sensor networks to reduce the communication cost especially over low bandwidth links. The proposed scheme is to defend against cloning attack, sink hole attacks and black hole attacks using mobile agents. In the cloning attack, adversary introduces replicas of compromised node. In the sinkhole attack, an adversary lures traffic through a compromised node. A black hole attack is a type of denial-of-service attack accomplished by dropping packets for a particular network destination in bulk (by dropping all packets).For dealing with black hole attacks more than one base station concept is also added with mobile agent concept to bring the best result. Here we implement a simulation-based model of our solution to recover from cloning attack, sinkhole attack and black hole attack in a Wireless Sensor Network. This mechanism does not require more energy.Comparison of communication overhead and cost were made between the proposed attack detection system using mobile agent against the security system in the absence of mobile agents. Comparison was also done between the proposed security system with the security system handling single attack. The mobile agents were developed using the Aglet.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کامل