CFP last date
20 January 2025
Reseach Article

Cluster Head Selection Based Energy Efficient Technique for Defending against Black Hole Attack in Wireless Sensor Networks

Published on October 2015 by Snehal P. Dongare, and Ram S. Mangrulkar
International Conference on Advancements in Engineering and Technology (ICAET 2015)
Foundation of Computer Science USA
ICQUEST2015 - Number 5
October 2015
Authors: Snehal P. Dongare, and Ram S. Mangrulkar
7a52750a-2463-4e4b-8bc1-2b33930c3f72

Snehal P. Dongare, and Ram S. Mangrulkar . Cluster Head Selection Based Energy Efficient Technique for Defending against Black Hole Attack in Wireless Sensor Networks. International Conference on Advancements in Engineering and Technology (ICAET 2015). ICQUEST2015, 5 (October 2015), 4-10.

@article{
author = { Snehal P. Dongare, and Ram S. Mangrulkar },
title = { Cluster Head Selection Based Energy Efficient Technique for Defending against Black Hole Attack in Wireless Sensor Networks },
journal = { International Conference on Advancements in Engineering and Technology (ICAET 2015) },
issue_date = { October 2015 },
volume = { ICQUEST2015 },
number = { 5 },
month = { October },
year = { 2015 },
issn = 0975-8887,
pages = { 4-10 },
numpages = 7,
url = { /proceedings/icquest2015/number5/23006-2889/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advancements in Engineering and Technology (ICAET 2015)
%A Snehal P. Dongare
%A and Ram S. Mangrulkar
%T Cluster Head Selection Based Energy Efficient Technique for Defending against Black Hole Attack in Wireless Sensor Networks
%J International Conference on Advancements in Engineering and Technology (ICAET 2015)
%@ 0975-8887
%V ICQUEST2015
%N 5
%P 4-10
%D 2015
%I International Journal of Computer Applications
Abstract

Wireless Sensor Networks (WSNs), besides its huge application areas, is prone to various types of attacks and security threats. Due to its dynamic topology, highly decentralized infrastructure and resource constraint sensors, proper energy utilization becomes a challenging issue. These entities are responsible to make WSNs susceptible to various types of denials of service attacks which results in disastrous consequences like energy-hole creation in the network. Various cluster head selection based energy efficient protocols have been proposed to improve the lifetime of WSNs. In mostof the energy efficient techniques, different approaches for energy utilization by sensors are proposed to extend lifetime of WSNs. The proposed scheme is defend against cooperative Gray-Hole and Black-Hole attacks that lead to performance degradation in WSNs containing mobile sensors. In order to overcome this, energy efficient technique is presented in this paper to mitigate the impact of both attacks simultaneously, on improving cluster head selection mechanism. Proposed protocol implements a energy efficient technique, on detecting and preventing compromised node to be a part on network communication in WSNs. It also determineshonest nodes to become cluster head during packets transmission phase in WSNs. NS2 simulation result compare proposed protocol with LEACH proves that implemented scheme effectivelyminimize the chance of compromised node to become cluster head and significantly achieves better network performance related to packet delivery ratio(PDR), throughput ,end-to-end delay and energy utilization in WSNs.

References
  1. Ganesh R. Pathak,Suhas H. Patil,Jyoti S. Tryambake"Efficient and Trust Based Black HoleAttack Detection andPrevention In Wireless Sensor Networks", International Conference on Computer Science and Business Informatics, ISSN: 1694-2108, Vol. 14 No. 2. 2014.
  2. Sheela. D, Srividhya. V. R. , Asma Begam, Anjali and Chidanand G. M. "Detecting Black Hole Attacks in Wireless Sensor Networks using Mobile Agent",International Conference on Artificial Intelligence and Embedded Systems (ICAIES)July 15-16, Singapore,2012.
  3. Jaspreet Kaur,Vinod Kumar" An Effectual Defense Method Against Gray-Hole Attack in Wireless Sensor Networks", International Journal of Computer Science and Information Technologies(IJCSIT),Vol. 3,2012,4523-4528.
  4. Wazir Zada Khan,Yang Xiang,Mohammed Y. Aalsalem,Quratulain Arshad"The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures", I. J. Wireless and Microwave Technologies,2,33-44. Published Online April 2014.
  5. Nidhi Chhajed, Mayank Sharma, "Detection and Prevention Techniques for Black hole Attack in Wireless Sensor Networks: A Review", International Journal of Advanced Research in Computer Science and Software Engineering,Volume-4,Issue-11,November 2014.
  6. Osama Moh'd Alia,Zyad Shaaban,Ahmad Basheer,Alaa Al-Ajouri,Ahmed Alsswey,"Musician Inspired Clustering Protocol for Efficient Energy in Wireless Sensor Networks", Sensor Networks and Cellular Systems (SNCS) Research center, Saudi Arabia,IEEE 2014.
  7. Mahmoud M. Salim, Hussein A. Elsayed, Salwa H. El Ramly," PR – LEACH: Approach for Balancing Energy Dissipation of LEACH Protocol for Wireless Sensor Networks",31st National Radio Science Conference (NRSC), April 28-30, 2014 Ain Shams University, Egypt.
  8. Itika Gupta,A. K. Daniel,"An Energy Efficient Position Based ClusteringProtocol for Wireless Sensor Networks using Round Robin Scheduling Technique",3rdInternational Conference on Advanced Computing and Communication Technologies, 10. 1109 ACCT. 2013. 59.
  9. Haider N. Javaid,N. Amjad,A. A. Awan,A. Khan,N. Khan," REECH-ME: Regional Energy Efficient Cluster Heads Based on Maximum Energy Routing Protocol for Wireless Sensor Networks " 8thInternational Conference on Broadband, Wireless Computing,Communication and Applications, IEEE 2013.
  10. Sushant Miglani,Rajoo Pandey,"Optimization of Clustering Probability of LEACHProtocol for Lifetime Maximization of Wireless Sensor Networks "2nd International Conference On Parallel, Distributed and Grid Computing,IEEE 2012 .
  11. Yiping Yang,Chuan Lai,Lin Wang, "Energy Efficient Clustering Algorithm for Wireless Sensor Network",10thIEEE International Conference on Control and Automation (ICCA)Hangzhou,China,June12-14, 2013.
  12. Qingwei Liu,Jin Li, Mandan Liu,"A Clustering Algorithm Based on Local Competition and Double Weigh Communication Energy-Consumption for Wireless Sensor Networks",10th IEEE International Conference on Control and Automation (ICCA) Hangzhou, China, June 12-14, 2013.
  13. Lu Gao,Zhongmin Li,"Energy Consumption Balanced Cluster Head Selection Algorithm for Wireless Sensor Networks"International Conference on Computer Science and Applications,IEEE-2013
  14. Ashfaq Ahmad,Nadeem Javaid,Zahoor Ali Khan,Umar Qasim,Turki Ali Alghamdi"(ACH)2: Routing Scheme to Maximize Lifetime and Throughput of Wireless Sensor Networks"IEEE Sensor Journal. VOL. 14 No. 10 October,2014.
  15. Jin Wang, Zhongqi Zhang, Jian Shen,"An Improved Stable Election Based" Protocol with Mobile Sink for Wireless Sensor Networks " International Conference on Green Computing and Communications and IEEE Internet ofThings An IEEE Cyber,Physical and Social Computing,CPSCom. 2013. 163.
  16. F. Saleem, Y. Moeen, M. Behzad, M. A. Hasnat,Z. A. Khan, U. Qasim,N. Javaid,"IDDR Improved Density Controlled Divide and Rule Scheme for Energy Efficient Routing in WSNs", 9thInternational Conference on Future Networks and Communications(FNC) 2014.
  17. M. S. Fareed, N. Javaid,M. Akbar,S. Rehman,U. Qasim,Z. A. Khan," Optimal NumberOf Cluster Head Selection for Efficient Distribution of Sources in Wireless Sensor Networks",7th International Conference on Broadband, Wireless Computing, Communication and Application, 2012.
  18. Shalli Rani,Jyotish Malhotra,Rajneesh Talwar,"Energy Efficient Protocol for Densely Deployed Homogeneous Network ", in International Conference on Issuesand Challenges in Intelligent Computing Techniques (ICICT)-2014.
  19. Noor Zaman, Tung Jang Low, Turki Aghamdi, "Energy Efficient Routing Protocol for Wireless Sensor Networks", 3rd International Conference on 289968650-3-2, February16-19, ICACT, 2014.
  20. Vishnu K. , Amos J. Paul,"Detection and Removal of Cooperative Black/Gray hole attack inMobileADHOC Networks", InternationalJournal of ComputerApplications(0975 - 8887), Volume 1 – No. 22, 2010.
  21. M. Natranjan, R. Arthi, K. Murugan,"Energy Aware Optimal CH Selectionin WSNs", in IEEE 4th ICCCNT, Tiruchengode, India, July 4-6, ICCCNT 2013.
  22. Van-Trinh HOANG,Nathalie JULIEN,Pascal BERRUET,"Cluster Head Selection Algorithm to Enhance-Efficiency and Reliability of Wireless Sensor Networks",International Conference on European Wireless Sensor Networks,ISBN 978-3-8007-3621-8,VDE VERLANG,Berlin,Offenbach,Germany.
  23. Anjali Thampi K. G, L. M. Nithya, "An Efficient ID-Based Scheme For Filtering GangInjected False Data In Wireless Sensor Networks",International Journal of Advanced Research in Computer and Communication Engineering,Vol. 2, Issue 4, April 2013.
  24. S. Sajithbanu, M. Durairaj, "Detecting False Data in Wireless Sensor Networks using Effective Becan Scheme", International Journal of Computer Applications(0975-8887),Volume 43,N0. 18,April 2012.
  25. Hyeon Myeong Choi, Su Man Nam, Tae Ho Cho, "A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks", Scientific Research on Wireless Sensor Networks,2013,5,33-40,PublishedOnline, http://www. scirp. org/journal/wsn, March 2013.
  26. Ebin Deni Raj "An Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks - EDRLEACH ", IOSRJournalof Computer Engineering (IOSRJCE),ISSN: 2278-0661 Volume- 2, Issue-2, and July- Aug. 2012, PP 39-44
Index Terms

Computer Science
Information Sciences

Keywords

Black-hole Attack Cluster Head Selection Delay Energy Efficiency Gray-hole Attack Leach Network Lifetime Packet Delivery Ratio Throughput wireless Sensor Networks.