ISSN Print: 2381-1137  ISSN Online: 2381-1145
International Journal of Wireless Communications, Networking and Mobile Computing  
Manuscript Information
 
 
Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing
Vol.3 , No. 5, Publication Date: Sep. 26, 2016, Page: 48-52
1401 Views Since September 26, 2016, 704 Downloads Since Sep. 26, 2016
 
 
Authors
 
[1]    

Mehndi Samra, School of Computer Science Engineering, Shri Mata Vaishno Devi University, Katra, India.

[2]    

Naveen Kumar Gondhi, School of Computer Science Engineering, Shri Mata Vaishno Devi University, Katra, India.

 
Abstract
 

The paper demonstrates simulation of blackhole attack in wireless sensor networks. A node is considered suspicious in case there is a large drop of packets by the node and as a result very little or none of the packets are able to reach the destination. The paper proposes first a modified AODV routing protocol for simulating a blackhole second detecting the same using contingency table generated by the model based on support vector machine.


Keywords
 

Blackhole, Malicious, AODV, SVM, Contigency


Reference
 
[01]    

Berkeley MICA mote. http://webs.cs.berkeley.edu/tos/hardware/hardware.html, 2003.

[02]    

J. M. Kahn, R. H. Katz, and K. S. J. Pister. Next century challenges: Mobile networking for “smart dust”. In International Conference on Mobile Computing and Networking (MOBICOM), pages 271–278, 1999.

[03]    

Abderrahmane Baadache, Ali Belmehdi “Avoiding-Black-Hole-and-Cooperative-Black-Hole-Attacks-in-Wireless-Ad-hoc-Networks” IJCSIS) International journal of Computer Science and Information Secrity, Vol. 7, No. 1, 2010.

[04]    

J. M. Kahn, R. H. Katz, and K. S. J. Pister. Emerging challenges: Mobile networking for “smart dust”. Journal of Communications and Networks, 2 (3): 188–196, September 2000.

[05]    

Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003.

[06]    

T. S. Rappaport. Wireless communications: principles and practice. Prentice Hall, 2nd edition, 2002.

[07]    

R. Bahl, R. Kumar and J. P. Singh, "Comparison of buffering in Manhattan Street Network in NS2," Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on, Hong Kong, 2010, pp. 441-443.





 
  Join Us
 
  Join as Reviewer
 
  Join Editorial Board
 
share:
 
 
Submission
 
 
Membership