Abstract
WSN is made up of nodes that communicate with one another with the help of a wireless channel. These days the WSN is used to communicate among two or more nodes that are linked in a network. So there should be a good security protocol to hold the confidentiality of the data which is transferred in between the source and the sink. In this proposed work, a method to detect and prevent blackhole attack using hidden Markov model (HMM) is used to identify malicious nodes. This work is implemented using simulation and result shows that malicious nodes are getting detected. After detection on malicious nodes, communication from malicious nodes are stopped and packet is getting rerouted with reliable and secure link.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
H. Kalkha, H. Satori, K. Satori, Preventing black hole attack in wireless sensor network using HMM. Procedia Comput. Sci. 148, 552–561 (2019)
A. Yasin, M. Abu Zant, Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mob. Comput. (2018)
M. Wazid, A.K. Das, A secure group-based blackhole node detection scheme for hierarchical wireless sensor networks. Wirel. Pers. Commun. 94(3), 1165–1191 (2017)
G. Kaur, V.K. Jain, Y. Chaba, Detection and prevention of blackhole attacks in wireless sensor networks, in International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments (Springer, Cham, 2017), pp. 118–126
H. Sikarwar, D. Das, A lightweight and secure authentication protocol for WSN, in 2020 International Wireless Communications and Mobile Computing (IWCMC) (IEEE, 2020), pp. 475–480
N.F.A. AL-Shaihk, R. Hassanpour, Active defense strategy against jamming attack in wireless sensor networks. Int. J. Comput. Netw. Inf. Secur. 11(11) (2019)
A. Rani, S. Kumar, A survey of security in wireless sensor networks, in 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT) (IEEE, 2017), pp. 1–5
J. Grover, S. Sharma, Security issues in wireless sensor network—A review, in 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) (IEEE, 2016), pp. 397–404
B. Rajasekaran, C. Arun, Link failure detection and classification in wireless sensor networks using classification method. Int. J. Innov. Technol. Exploring Eng. (IJITEE) 8(12), 1–4 (2019)
T. Kaur, R. Kumar, Mitigation of blackhole attacks and wormhole attacks in wireless sensor networks using aodv protocol, in 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE) (IEEE, 2018), pp. 288–292
O.O. Olakanmi, A. Dada, Wireless sensor networks (WSNs): Security and privacy ıssues and solutions, in Wireless Mesh Networks-Security, Architectures and Protocols (IntechOpen, 2020)
G. Arulkumaran, R.K. Gnanamurthy, Fuzzy trust approach for detecting black hole attack in mobile adhoc network. Mob. Netw. Appl. 24(2), 386–393 (2019)
P.B. Hari, S.N. Singh, Security issues in wireless sensor networks: current research and challenges, in 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA)(Spring) (IEEE, 2016), pp. 1–6
K. Arora, D. Kavita, V. Jain, Impacts of black hole attack on mobile ad-hoc networks. Int. J. Future Gener. Commun. Netw. 13(4), 644–653 (2020)
M. Motamedi, N. Yazdani, Detection of black hole attack in wireless sensor network using UAV, in 2015 7th Conference on Information and Knowledge Technology (IKT) (IEEE, 2015), pp. 1–5
R.K. Yadav, R. Mishra, An authenticated enrolment scheme of nodes using blockchain and prevention of collaborative blackhole attack in WSN (2020)
M. Shinde, D.C. Mehetre, Black hole and selective forwarding attack detection and prevention in WSN, in 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) (IEEE, 2017), pp. 1–6
S. Manishankar, P.R. Ranjitha, T. Manoj Kumar, Energy efficient data aggregation in sensor network using multiple sink data node, in IEEE Xplore, International Conference on Communication and Signal Processing (2017) [2018]
S. Gokuldev, C. Sowntharya, S. Manishankar, A pro-active fault tolerant deadline hit count based scheduling ın computational grid. ARPN J. Eng. Appl. Sci. © 2006–2017 Asian Research Publishing Network (ARPN), vol. 12, no. 23, December 2017. ISSN 1819-6608
B.J. Santhosh Kumar, K. Vijay, Symmetric key based encryption and decryption using Lissajous curve equations. Int. J. Electr. Comput. Eng. (IJECE) 7(1), 285–288 (2017). ISSN: 2088-8708. https://doi.org/10.11591/ijece.v7i1.pp285-288. Journal homepage http://iaesjournal.com/online/index.php/IJECE
S. Anand, K.C. Manoj, A survey on clustering approaches to strengthen the performance of wireless sensor network, in 2020 Second International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India (2020), pp. 814–820. https://doi.org/10.1109/ICIRCA48905.2020.9183174
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Anand, S., Muhammad Rafeeque, K. (2022). Enhancing the Security in Wireless Sensor Network Using Hidden Markov Model. In: Ranganathan, G., Fernando, X., Shi, F., El Allioui, Y. (eds) Soft Computing for Security Applications . Advances in Intelligent Systems and Computing, vol 1397. Springer, Singapore. https://doi.org/10.1007/978-981-16-5301-8_31
Download citation
DOI: https://doi.org/10.1007/978-981-16-5301-8_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-5300-1
Online ISBN: 978-981-16-5301-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)