Vol.3 , No. 5, Publication Date: Sep. 26, 2016, Page: 48-52
[1] | Mehndi Samra, School of Computer Science Engineering, Shri Mata Vaishno Devi University, Katra, India. |
[2] | Naveen Kumar Gondhi, School of Computer Science Engineering, Shri Mata Vaishno Devi University, Katra, India. |
The paper demonstrates simulation of blackhole attack in wireless sensor networks. A node is considered suspicious in case there is a large drop of packets by the node and as a result very little or none of the packets are able to reach the destination. The paper proposes first a modified AODV routing protocol for simulating a blackhole second detecting the same using contingency table generated by the model based on support vector machine.
Keywords
Blackhole, Malicious, AODV, SVM, Contigency
Reference
[01] | Berkeley MICA mote. http://webs.cs.berkeley.edu/tos/hardware/hardware.html, 2003. |
[02] | J. M. Kahn, R. H. Katz, and K. S. J. Pister. Next century challenges: Mobile networking for “smart dust”. In International Conference on Mobile Computing and Networking (MOBICOM), pages 271–278, 1999. |
[03] | Abderrahmane Baadache, Ali Belmehdi “Avoiding-Black-Hole-and-Cooperative-Black-Hole-Attacks-in-Wireless-Ad-hoc-Networks” IJCSIS) International journal of Computer Science and Information Secrity, Vol. 7, No. 1, 2010. |
[04] | J. M. Kahn, R. H. Katz, and K. S. J. Pister. Emerging challenges: Mobile networking for “smart dust”. Journal of Communications and Networks, 2 (3): 188–196, September 2000. |
[05] | Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003. |
[06] | T. S. Rappaport. Wireless communications: principles and practice. Prentice Hall, 2nd edition, 2002. |
[07] | R. Bahl, R. Kumar and J. P. Singh, "Comparison of buffering in Manhattan Street Network in NS2," Communication Systems, Networks and Applications (ICCSNA), 2010 Second International Conference on, Hong Kong, 2010, pp. 441-443. |