Detection of Black Hole Attack in Wireless Sensor Network Using UAV

被引:0
|
作者
Motamedi, Maryam [1 ]
Yazdani, Nasser [1 ]
机构
[1] Univ Tehran, Elect & Comp Engn Dept, Tehran, Iran
关键词
WSN; black hole attack; UAV; SPRT; sequential hypothesis testing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, unmanned aerial vehicles (UAVs) has been proposed for effective data propagation and collection in wireless sensor networks (WSNs). In this paper, we use UAV for detecting black hole attack in WSN. Black hole attack is accomplished by malicious nodes that advertise their route to the intended destination as the shortest and optimized one, therefore, they gather most of the network traffic and then drop all packets. This attack results in loss of critical information on the network. We propose a method to overcome this problem with a shorter running time in comparison to other methods and detect malicious nodes with higher probability. UAV is used for checking nodes and Sequential Probability Ratio Test method as a dynamic threshold scheme for blocking malicious nodes. Simulations and analyses show that our proposed technique achieves effective and fast detection of black hole attack with acceptable energy consumption.
引用
下载
收藏
页数:5
相关论文
共 50 条
  • [1] Preventing Black Hole Attack in Wireless Sensor Network Using HMM
    Kalkha, Hanane
    Satori, Hassan
    Satori, Khalid
    SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2018), 2019, 148 : 552 - 561
  • [2] DETECTION AND ISOLATION OF BLACK HOLE ATTACK IN WIRELESS SENSOR NETWORK USING HYBRID TECHNIQUES( Received Packet And Time Delay)
    Kaur, Arshdeep
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 196 - 200
  • [3] Security Against Black Hole Attack In Wireless Sensor Network-A Review
    Mishra, Binod Kumar
    Nikam, Mohan C.
    Lakkadwala, Prashant
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 615 - 620
  • [4] Detection of Black Hole in Wireless Sensor Network based on Data Mining
    Kaur, Gursheen
    Singh, Mandeep
    2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 457 - 461
  • [5] Identification and Mitigation of Black Hole Attack in Wireless Sensor Networks
    Kaur, Harpreet
    Singh, Amarvir
    2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 616 - 619
  • [6] ADSMS: ANOMALY DETECTION SCHEME FOR MITIGATING SINK HOLE ATTACK IN WIRELESS SENSOR NETWORK
    Yasin, N. Mohammaed
    Balaji, N.
    Sambasivam, G.
    Basha, M. S. Saleem
    Sujatha, P.
    2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC), 2017, : 154 - 159
  • [7] Performance Analysis on LEACH Protocol in Wireless Sensor Network (WSN) Under Black Hole Attack
    Ariffin, Khairul Akram Zainol
    Mokhtar, Rozita Mohd
    Abd Rahman, Abdul Hadi
    ADVANCED SCIENCE LETTERS, 2018, 24 (03) : 1791 - 1794
  • [8] Detection of Sinkhole Attack in Wireless Sensor Network
    Raju, Imandi
    Parwekar, Pritee
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 629 - 636
  • [9] Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM
    Pawar, Mohandas V.
    J., Anuradha
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (01) : 124 - 153
  • [10] Hole Detection in Wireless Sensor Network: A Review
    Das, Smita
    DebBarma, Mrinal Kanti
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 87 - 96