Prevention of Blackhole Attack in Wireless Sensor Network using IPSec Protocol
Main Article Content
Abstract
A Wireless Sensor Network is consist of spatially distributed autonomous sensor devices to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure and pollutants etc. at various locations. WSN is highly prone to severe attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of the sensor devices i.e. low battery power, limited computation capability, bounded memory and energy resources, susceptibility to physical threat and the use of insecure wireless communication channels. Sensor nodes communicate via wireless links over limited frequency and bandwidth. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. The black-hole attack is one of the severe deniel-of-servie attack on wireless sensor network can be accomplished by dropping the data packets. The attack can be accomplished either selectively i.e. by dropping data packets for a particular destination or a randomly selected portion of the data packets or by dropping all the data packets in that network. In this paper, the IPSec (Internet protocol security) protocol based on symmetric key cryptography is used against black-hole attack in WSN. IPSec provides data security at the IP packet level. IPSec helps to create authenticated and confidential packets for IP layer. IPSec uses two efficient protocols i.e. AH (Authentication Header), ESP (Encapsulating Security Protocol). Each has their own specifications and functions. These protocols are operating in two basic modes that are: Transport Mode and Tunnel Mode. In the present work, ESP protocol is used in transport mode. It operates on DES-CBC algorithms for encryption/decryption and HMAC-MD5 algorithms are used for authentication. The performance of IPSec protocol is evaluated on the basis of metrics like throughput, total packet received, end-to-end delay and jitter.
Â
Keywords: Black-hole attack, IPSec, WSN, AODV, CBR
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.