Rajneesh Pachouri, Abhishek soni, Anurag Jain


Security is the fundamental issue in wireless sensor networks and attackers are effortlessly altered the Actual behaviour  and performance  of network. In this research work we give the security plot against single and multiple black hole attack in wireless sensor networks. in black hole attack malicious node behave like a normal node and show that they are part of our network but when the data packets arrives they drops all the packets and reply false value to other nodes. in this proposed scheme we have identified the attackers node that caputers the data packets and nor forwareded to the destination. in wireless sensor network the malicious nodes are only nodes which are not farwareded data packects to goal node. in our proposed scheme we not only detect single black hole but also capable to detect multiple blackhole attack. black hole attack is veryharmful attack, the proposed method is surely identify the malicious node from the dynamic network and increase the network efficiancy.  



Blackhole, WSN, Routing, Security, IDS, Malicious nodes

Full Text:



Horng, Shi-Jinn, et al. "A novel intrusion detection system based on hierarchical clustering and support vector machines." Expert systems with Applications 38.1 (2011): 306-313.

Hayoung Oh,” Attack Classification based on Data Mining Technique and its application for Reliable Medical Sensor Communication”, International Journal of Computer Science and Applications, Vol.6, No. 3, pp 20 – 32, 2009.

Mohit Malik, Namarta kapoor, Esh naryan, Aman Preet Singh,” Rule Based Technique detecting Security attack for Wireless Sensor network using fuzzy logic”, International Journal of Advanced Research in Computer Engineering & Technology,Volume 1, Issue 4, , ISSN: 2278 – 1323, June 2012.

Reda M. Elbasiony , Elsayed A. Sallam , Tarek E. Eltobely ,Mahmoud M. Fahmy ,” A hybrid network intrusion detection framework based on random forests and weighted k-means” Ain Shams Engineering Journal”, vol 4, pp.753–762,2013.

Levent Koc , Thomas A. Mazzuchi, Shahram Sarkani,“A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier”, Elsevier,pp.13492–13500, 2012.

Wenying Fenga, Qinglei Zhangc, Gongzhu Hud, Jimmy Xiangji Huange, “Mining network data for intrusion detection through combining SVMs with ant colony networks”, Elsevier , pp. 127-140, 2013

Megha Bandgar, Komal dhurve, Sneha Jadhav,Vicky Kayastha,Prof. T.J Parvat, “ Intrusion Detection System using Hidden Markov Model (HMM)”, IOSR Journal of Computer Engineering (IOSRJCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 3, pp.66-70, (Mar. - Apr.2013).

Dat Tran, Wanli Ma, and Dharmendra Sharma,”Network Anomaly Detection using Fuzzy Gaussian Mixture Models”, International Journal of Future Generation Communication and Networking, pp.37-42, 2012.

Vahid Golmah, “ An Efficient Hybrid Intrusion Detection System based on C5.0 and SVM”, International Journal of Database Theory and Application Vol.7, No.2 ,pp.59-70, (2014).

Punam Mulak, Nitin R. Talhar, “Novel Intrusion Detection System Using Hybrid Approach”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 11, ISSN: 2277 128X, November 2014.

Venkata Suneetha Takkellapati1 , G.V.S.N.R.V Prasad,” Network Intrusion Detection system based on Feature Selection and Triangle area Support Vector Machine”, International Journal of Engineering Trends and Technology-Volume3Issue4- 2012

Vaishali Kosamkar, Sangita S Chaudhari,”Improved Intrusion Detection System using C4.5Decision Tree and Support Vector Machine”,International Journal of Computer Science and Information Technologies, Vol. 5 (2) , pp. 1463-1467, 2014

Levent Koc , Thomas A. Mazzuchi, Shahram Sarkani,“A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier”, Elsevier,pp.13492–13500, 2012.

Dr Karim KONATE, GAYE Abdourahime “Attacks Analysis in mobile ad hoc networks: Modeling and Simulation”, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation, pp. 367 – 372, 2011.

N. Gandhewar, R.Patel, “Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network”, Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 714 – 718, 2012.

P.K Singh, G. Sharma, “An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 902 –906, 2012.

Jian-Ming Chang, Po-Chun Tsou, Han-Chieh Chao, Jiann-Liang Chen, “CBDS: A Cooperative Bait Detection Scheme to prevent malicious node for MANET based on hybrid defense architecture”, 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (Wireless VITAE), pp. 1-5, 2011.



  • There are currently no refbacks.

Copyright (c) 2018 International Journal of Advanced Research in Computer Science