BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks

Satyajayant Misra, Kabi Bhattarai, Guoliang Xue

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)

Abstract

Black hole attacks occur when an adversary captures and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of forwarding them towards the base station. As a result any information that enters the black hole region is captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by partitioning the network, such that important event information do not reach the base stations. Several techniques based on secret sharing and multipath routing have been proposed in the literature to overcome black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate in this paper, they may even end up making black hole attacks more effective. We propose an efficient technique that uses multiple base stations deployed in the network to counter the impact of black holes on data transmission. Our simulation results demonstrate that our technique can achieve more than 99% packet delivery success. We prove that our scheme can identify 100% of the black hole nodes and demonstrate by simulation results that the technique suffers from very little false positives.

Original languageEnglish (US)
Title of host publicationIEEE International Conference on Communications
DOIs
StatePublished - 2011
Event2011 IEEE International Conference on Communications, ICC 2011 - Kyoto, Japan
Duration: Jun 5 2011Jun 9 2011

Other

Other2011 IEEE International Conference on Communications, ICC 2011
CountryJapan
CityKyoto
Period6/5/116/9/11

Fingerprint

Base stations
Wireless sensor networks
Data communication systems

Keywords

  • black hole
  • multiple base stations
  • security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Misra, S., Bhattarai, K., & Xue, G. (2011). BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. In IEEE International Conference on Communications [5962856] https://doi.org/10.1109/icc.2011.5962856

BAMBi : Blackhole attacks mitigation with multiple base stations in wireless sensor networks. / Misra, Satyajayant; Bhattarai, Kabi; Xue, Guoliang.

IEEE International Conference on Communications. 2011. 5962856.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Misra, S, Bhattarai, K & Xue, G 2011, BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks. in IEEE International Conference on Communications., 5962856, 2011 IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 6/5/11. https://doi.org/10.1109/icc.2011.5962856
Misra, Satyajayant ; Bhattarai, Kabi ; Xue, Guoliang. / BAMBi : Blackhole attacks mitigation with multiple base stations in wireless sensor networks. IEEE International Conference on Communications. 2011.
@inproceedings{385c9345676c4e7b907ac9a5f7e143be,
title = "BAMBi: Blackhole attacks mitigation with multiple base stations in wireless sensor networks",
abstract = "Black hole attacks occur when an adversary captures and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of forwarding them towards the base station. As a result any information that enters the black hole region is captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by partitioning the network, such that important event information do not reach the base stations. Several techniques based on secret sharing and multipath routing have been proposed in the literature to overcome black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate in this paper, they may even end up making black hole attacks more effective. We propose an efficient technique that uses multiple base stations deployed in the network to counter the impact of black holes on data transmission. Our simulation results demonstrate that our technique can achieve more than 99{\%} packet delivery success. We prove that our scheme can identify 100{\%} of the black hole nodes and demonstrate by simulation results that the technique suffers from very little false positives.",
keywords = "black hole, multiple base stations, security, Wireless sensor networks",
author = "Satyajayant Misra and Kabi Bhattarai and Guoliang Xue",
year = "2011",
doi = "10.1109/icc.2011.5962856",
language = "English (US)",
isbn = "9781612842332",
booktitle = "IEEE International Conference on Communications",

}

TY - GEN

T1 - BAMBi

T2 - Blackhole attacks mitigation with multiple base stations in wireless sensor networks

AU - Misra, Satyajayant

AU - Bhattarai, Kabi

AU - Xue, Guoliang

PY - 2011

Y1 - 2011

N2 - Black hole attacks occur when an adversary captures and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of forwarding them towards the base station. As a result any information that enters the black hole region is captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by partitioning the network, such that important event information do not reach the base stations. Several techniques based on secret sharing and multipath routing have been proposed in the literature to overcome black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate in this paper, they may even end up making black hole attacks more effective. We propose an efficient technique that uses multiple base stations deployed in the network to counter the impact of black holes on data transmission. Our simulation results demonstrate that our technique can achieve more than 99% packet delivery success. We prove that our scheme can identify 100% of the black hole nodes and demonstrate by simulation results that the technique suffers from very little false positives.

AB - Black hole attacks occur when an adversary captures and re-programs a set of nodes in the network to block/drop the packets they receive/generate instead of forwarding them towards the base station. As a result any information that enters the black hole region is captured. Black hole attacks are easy to constitute, and they are capable of undermining network effectiveness by partitioning the network, such that important event information do not reach the base stations. Several techniques based on secret sharing and multipath routing have been proposed in the literature to overcome black hole attacks in the network. However, these techniques are not very effective, and as we demonstrate in this paper, they may even end up making black hole attacks more effective. We propose an efficient technique that uses multiple base stations deployed in the network to counter the impact of black holes on data transmission. Our simulation results demonstrate that our technique can achieve more than 99% packet delivery success. We prove that our scheme can identify 100% of the black hole nodes and demonstrate by simulation results that the technique suffers from very little false positives.

KW - black hole

KW - multiple base stations

KW - security

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=80052168713&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80052168713&partnerID=8YFLogxK

U2 - 10.1109/icc.2011.5962856

DO - 10.1109/icc.2011.5962856

M3 - Conference contribution

AN - SCOPUS:80052168713

SN - 9781612842332

BT - IEEE International Conference on Communications

ER -