Visible to the public Detection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN

TitleDetection and Prevention of Black Hole Attacks in IOT Amp;Amp; WSN
Publication TypeConference Paper
Year of Publication2018
AuthorsAli, S., Khan, M. A., Ahmad, J., Malik, A. W., ur Rehman, A.
Conference Name2018 Third International Conference on Fog and Mobile Edge Computing (FMEC)
Date Publishedapr
ISBN Number978-1-5386-5896-3
Keywordsattacks, autonomous cars, Base stations, black hole, Black hole attacks, body sensor networks, compositionality, computer network security, gateway nodes, Generic Nodes, grey hole, hello flood attacks, Human Behavior, human factors, Internet, Internet of Everything, Internet of Things, internetworking, IoET, jamming-attack, Logic gates, network servers, PDA, pubcrawl, refrigerators, resilience, Resiliency, security, selective forwarding attack, sensor, Sensors, Sinkhole attack, Smart Grid Sensors, smart grid stations, Smart grids, smart toasters, smartphone, Sybil attack, VANET, vulnerabilities, Wireless communication, Wireless Sensor Network, Wireless sensor networks, wormhole attack, WSN, WSN network
Abstract

Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two types of nodes i.e. generic nodes and gateway nodes. Generic nodes having the ability to sense while gateway nodes are used to route that information. IoT now extended to IoET (internet of Everything) to cover all electronics exist around, like a body sensor networks, VANET's, smart grid stations, smartphone, PDA's, autonomous cars, refrigerators and smart toasters that can communicate and share information using existing network technologies. The sensor nodes in WSN have very limited transmission range as well as limited processing speed, storage capacities and low battery power. Despite a wide range of applications using WSN, its resource constrained nature given birth to a number severe security attacks e.g. Selective Forwarding attack, Jamming-attack, Sinkhole attack, Wormhole attack, Sybil attack, hello Flood attacks, Grey Hole, and the most dangerous BlackHole Attacks. Attackers can easily exploit these vulnerabilities to compromise the WSN network.

URLhttps://ieeexplore.ieee.org/document/8364068
DOI10.1109/FMEC.2018.8364068
Citation Keyali_detection_2018