CFP last date
20 January 2025
Reseach Article

Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations

by D. Sheela, G. Mahadevan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 9
Year of Publication: 2012
Authors: D. Sheela, G. Mahadevan
10.5120/8785-2757

D. Sheela, G. Mahadevan . Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations. International Journal of Computer Applications. 55, 9 ( October 2012), 34-41. DOI=10.5120/8785-2757

@article{ 10.5120/8785-2757,
author = { D. Sheela, G. Mahadevan },
title = { Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 9 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 34-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number9/8785-2757/ },
doi = { 10.5120/8785-2757 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:56:49.788878+05:30
%A D. Sheela
%A G. Mahadevan
%T Mollifying the Effect of Cloning, Sink Hole and Black Hole Attacksin Wireless Sensor Networks using Mobile Agents with Several Base Stations
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 9
%P 34-41
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Three dangerous attacks in wireless sensor network is handled in this proposed security solution. This paper proposes a lightweight and fast mobile agent technology based security solution against cloning attack, sinkhole attack and black hole attack for wireless sensor networks (WSNs). Recently mobile agents have been proposed in wireless sensor networks to reduce the communication cost especially over low bandwidth links. The proposed scheme is to defend against cloning attack, sink hole attacks and black hole attacks using mobile agents. In the cloning attack, adversary introduces replicas of compromised node. In the sinkhole attack, an adversary lures traffic through a compromised node. A black hole attack is a type of denial-of-service attack accomplished by dropping packets for a particular network destination in bulk (by dropping all packets). For dealing with black hole attacks more than one base station concept is also added with mobile agent concept to bring the best result. Here we implement a simulation-based model of our solution to recover from cloning attack, sinkhole attack and black hole attack in a Wireless Sensor Network. This mechanism does not require more energy. Comparison of communication overhead and cost were made between the proposed attack detection system using mobile agent against the security system in the absence of mobile agents. Comparison was also done between the proposed security system with the security system handling single attack. The mobile agents were developed using the Aglet.

References
  1. Yun zhou and Yuguang fang, university of florida, Yanchaozhang, new jersey institute of technology, "Securing Wireless Sensor Networks : A survey",IEEE Communications, 3rd quarter 2008, volume 10, no. 3.
  2. YingpeiZeng, Jiannong Cao, Senior Member, IEEE, Shigeng Zhang, ShanqingGuo and Li Xie, "Random walk based approach to detect clone attacks in wireless sensor networks", IEEE Journal of selected areas in communication, vol 28,No. 5, June 2010.
  3. SatyajayantMisra, KabiBhattarai, and GuoliangXue, "BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks", IEEE ICC 2011 proceedings.
  4. Z. Karakehayov. Using REWARD to detect team black-hole attacks in wireless sensor networks. In ACM Workshop on Real-World Wireless Sensor Networks, 2005.
  5. S. Roy, S. Singh, S. Choudhary, and N. Debnath. Countering sinkhole and black hole attacks on sensor networks using dynamic trust management. In IEEE Symposium on Computers and Communications, pages 537–542, 2008.
  6. W. Lou, W. Liu, Y. Zhang, and Y. Fang. SPREAD: enhancing data confidentiality in mobile ad hoc networks. In IEEE FOCOM, volume 4, pages 2404–2413, 2004.
  7. W. Lou and Y. Kwon. H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology, 55(4):1320–1330, 2006.
  8. M. Ketel, N. Dogan, A. Homaifar. Distributed Sensor Networks Based on Mobile Agents Paradigm. Proc. 37th Southeastern Symposium on System Theory, Tuskegee, AL, USA, 2005: 411-414.
  9. S. Didla, A. Ault, and S. Bagchi. Optimizing AES for embedded devices and wireless sensor networks. In Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities (Trident), pages 1–10, 2008.
  10. S. Misra and G. Xue. Efficient anonymity schemes for clustered wireless sensor networks. Intl. Journal of Sensor Networks, 1(1):50–63, 2006.
  11. S. Kim, J. -G. Ko, J. Yoon, and H. Lee. Multiple-objective metric for placing multiple base stations in wireless sensor networks. In Proceedings of the International Symposium on Wireless Pervasive Computing, pages 627–631, February 2007.
  12. B. Xiao, B. Yu, and C. Gao. CHEMAS:Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing,.
  13. DejanMilojicic,Charles Petrie, Chris Rygaard" Mobile agent applications" IEEE concurrency. ,July1999.
  14. Zhang Yuyong, Jingde. Mobile Agent Technology. Beijing, Tsinghua University Press, 2003.
  15. Zhu Miaoliang, Qiuyu. Mobile Agent System. Journal of Computer Research and Development, 2001, 38(1): 16-25.
  16. G. Sladic , M. Vidakovic and Z. Konjovic Agent based system for network availability and vulnerability monitoring 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics • September 8-10, 2011, Subotica, Serbia.
  17. L. Tong, Q. Zhao, S. Adireddy. Sensor Networks with Mobile Agents. IEEE Military Communications Conference, Boston, MA, USA, 2003:688-693.
  18. M. Ketel, N. Dogan, A. Homaifar. Distributed Sensor Networks Based on Mobile Agents Paradigm. Proc. 37th Southeastern Symposium on System Theory, Tuskegee, AL, USA, 2005: 411-414.
  19. H. Qi, Y. Xu, X. Wang. Mobile-Agent-based Collaborative Signal and Information Processing in Sensor Networks. Proc. IEEE, 2003, 91(8):1172-1183.
  20. B. Parno, A. Perrig, and V. Gligor, "Distributed Detection ofNode Replication Attacks in Sensor Networks," Proc. 2005 IEEESymp. Security and Privacy (SP'05), Oakland, CA, May 2005.
  21. Y. Zhang et al. , "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE JSAC, special issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, Feb. 2006, pp. 247–60.
  22. Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks, in: Proc. Of Infocom 2003. San Francisco, CA, USA, April 2003.
  23. S. Capkun, L. Buttyan, J. Hubaux, SECTOR: Secure Traking of Node Encounters in Muti-hop Wireless Networks, in: proc. Of SASN 2003. Fairfax, Virginia, October 2003.
  24. E. C. H Ngai, J. Liu and M R. Lyu, "On the intruder Detection for Sinkhole Attack in Wireless Sensor Networks," Proc. IEEE ICC, 2006.
  25. Z. Karakehayov. Using REWARD to detect team black-hole attacks in wireless sensor networks. In ACM Workshop on Real-World Wireless Sensor Networks, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

WSN mobile agent cloning attack sink hole attack black hole attack multiple base station