High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Black Hole Attack Eradication by Scheduled Base Station using Leach Protocol

Author(s):

S.Rajesh , Sri Ramakrishna Institute of Technology, Cbe-10; Dr.A.N.Jayanthi, Sri Ramakrishna institute of technology,Cbe-10; J.Mala, Sri Ramakrishna institute of technology,Cbe-10

Keywords:

Black Hole Attack, WSN, Leach Protocol, Base Station

Abstract

Wireless sensor networks are the one of the major areas of research. In which ,a guaranteed Unique routing protocol is a difficult task in mobile ad hoc networks due to the lack of primary authorization, knot mobility, widespread changes in topology, with restricted availability of resources. Wireless sensor networks are suitable for crisis situations like Natural disasters or Military applications and also used for monitoring temperature, humidity, e-house monitoring, precise agricultural production, Intelligent transportation service and intelligent home appliances. However wireless sensor networks are prone to a variety of likely attacks which disturbs the normal operation of the network. Therefore the data transfer between the nodes from the base station must require security from black-hole attack in the MANET which is a malicious node that attracts the data packets by falsely advertising a fresh route to the destination. There are lots of mechanisms have been proposed to thwart the black hole attack but none of them proves to be efficient. In this paper, LEACH routing protocol is used for the detection and prevention of black-hole attack in WSN has been anticipated. In this base station observe the divergence between the numbers of data packets received and forwarded by the node. A security signal is passed from base station to the node if irregular state exists during transmission. The examination of the system performance has been improved in terms of Packet Delivery Ratio, Detection Rate (DR) and Throughput and simulation results obtained using ns2 simulator.

Other Details

Paper ID: IJSRDV8I40577
Published in: Volume : 8, Issue : 4
Publication Date: 01/07/2020
Page(s): 305-307

Article Preview

Download Article