Detection of Blackhole Attack in Wireless Sensor Network Using Enhanced Check Agent
Title | Detection of Blackhole Attack in Wireless Sensor Network Using Enhanced Check Agent |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Saputra, R., Andika, J., Alaydrus, M. |
Conference Name | 2020 Fifth International Conference on Informatics and Computing (ICIC) |
Date Published | nov |
Keywords | Black hole attack, Blackhole attack, composability, Internet of Things, Metrics, Network security, pubcrawl, quality of service, Resiliency, Routing, Scalability, security, sensor security, Throughput, Wireless communication, Wireless Mesh Network Security, Wireless Sensor Network, Wireless sensor networks, Zigbee, zigbee 802.15.4 |
Abstract | Wireless Sensor Network (WSN) is a heterogeneous type of network consisting of scattered sensor nodes and working together for data collection, processing, and transmission functions[1], [2]. Because WSN is widely used in vital matters, aspects of its security must also be considered. There are many types of attacks that might be carried out to disrupt WSN networks. The methods of attack that exist in WSN include jamming attack, tampering, Sybil attack, wormhole attack, hello flood attack, and, blackhole attack[3]. Blackhole attacks are one of the most dangerous attacks on WSN networks. Enhanced Check Agent method is designed to detect black hole attacks by sending a checking agent to record nodes that are considered black okay. The implementation will be tested right on a wireless sensor network using ZigBee technology. Network topology uses a mesh where each node can have more than one routing table[4]. The Enhanced Check Agent method can increase throughput to 100 percent. |
DOI | 10.1109/ICIC50835.2020.9288571 |
Citation Key | saputra_detection_2020 |
- Scalability
- zigbee 802.15.4
- Zigbee
- wireless sensor networks
- sensor security
- Wireless Sensor Network
- Wireless Mesh Network Security
- Wireless communication
- Throughput
- security
- Black hole attack
- Routing
- Resiliency
- quality of service
- pubcrawl
- network security
- Metrics
- Internet of Things
- composability
- Blackhole attack