Prevention of Blackhole Attack in Wireless Sensor Network using IPSec Protocol

Main Article Content

Gurjot Singh
Jagdeep Singh

Abstract

A Wireless Sensor Network is consist of spatially distributed autonomous sensor devices to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure and pollutants etc. at various locations. WSN is highly prone to severe attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of the sensor devices i.e. low battery power, limited computation capability, bounded memory and energy resources, susceptibility to physical threat and the use of insecure wireless communication channels. Sensor nodes communicate via wireless links over limited frequency and bandwidth. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. The black-hole attack is one of the severe deniel-of-servie attack on wireless sensor network can be accomplished by dropping the data packets. The attack can be accomplished either selectively i.e. by dropping data packets for a particular destination or a randomly selected portion of the data packets or by dropping all the data packets in that network. In this paper, the IPSec (Internet protocol security) protocol based on symmetric key cryptography is used against black-hole attack in WSN. IPSec provides data security at the IP packet level. IPSec helps to create authenticated and confidential packets for IP layer. IPSec uses two efficient protocols i.e. AH (Authentication Header), ESP (Encapsulating Security Protocol). Each has their own specifications and functions. These protocols are operating in two basic modes that are: Transport Mode and Tunnel Mode. In the present work, ESP protocol is used in transport mode. It operates on DES-CBC algorithms for encryption/decryption and HMAC-MD5 algorithms are used for authentication. The performance of IPSec protocol is evaluated on the basis of metrics like throughput, total packet received, end-to-end delay and jitter.

 

Keywords: Black-hole attack, IPSec, WSN, AODV, CBR

Downloads

Download data is not yet available.

Article Details

Section
Articles