Shoukat Ali
Detection and prevention of Black Hole Attacks in IOT & WSN
Ali, Shoukat; Khan, Muazzam A; Ahmad, Jawad; Malik, Asad W.; ur Rehman, Anis
Abstract
Wireless Sensor Network is the combination of small devices called sensor nodes, gateways and software. These nodes use wireless medium for transmission and are capable to sense and transmit the data to other nodes. Generally, WSN composed of two types of nodes i.e. generic nodes and gateway nodes. Generic nodes having the ability to sense while gateway nodes are used to route that information. IoT now extended to IoET (internet of Everything) to cover all electronics exist around, like a body sensor networks, VANET's, smart grid stations, smartphone, PDA's, autonomous cars, refrigerators and smart toasters that can communicate and share information using existing network technologies. The sensor nodes in WSN have very limited transmission range as well as limited processing speed, storage capacities and low battery power. Despite a wide range of applications using WSN, its resource constrained nature given birth to a number severe security attacks e.g. Selective Forwarding attack, Jamming-attack, Sinkhole attack, Wormhole attack, Sybil attack, hello Flood attacks, Grey Hole, and the most dangerous BlackHole Attacks. Attackers can easily exploit these vulnerabilities to compromise the WSN network.
Presentation Conference Type | Conference Paper (Published) |
---|---|
Conference Name | 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) |
Start Date | Apr 23, 2018 |
End Date | Apr 26, 2018 |
Acceptance Date | Apr 2, 2018 |
Online Publication Date | May 31, 2018 |
Publication Date | 2018-04 |
Deposit Date | Sep 13, 2019 |
Publisher | Institute of Electrical and Electronics Engineers |
Book Title | 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC) |
ISBN | 9781538658963 |
DOI | https://doi.org/10.1109/fmec.2018.8364068 |
Keywords | WSN, Security, Generic Nodes, Gateway Nodes, Sensor, Vulnerabilities, Attacks, Black Hole |
Public URL | http://researchrepository.napier.ac.uk/Output/2133589 |
You might also like
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
(2019)
Journal Article
A secure image encryption scheme based on chaotic maps and affine transformation
(2015)
Journal Article
Chaos-based diffusion for highly autocorrelated data in encryption algorithms
(2015)
Journal Article
A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps
(2016)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search