The Black Hole Attack in Sensor Networks

碩士 === 銘傳大學 === 資訊管理學系碩士班 === 99 === A sensor network is composed of a lot of tiny sensors, where each sensor can sense the environmental information such as temperature, humidity, pressure, etc. The collected information is forwarded through a specific routing architecture to the base station for f...

Full description

Bibliographic Details
Main Authors: Hang-Yin Lai, 賴航胤
Other Authors: Wen-Huei Chen
Format: Others
Language:zh-TW
Published: 2011
Online Access:http://ndltd.ncl.edu.tw/handle/91802707047909409871
id ndltd-TW-099MCU05396026
record_format oai_dc
spelling ndltd-TW-099MCU053960262015-10-13T20:46:54Z http://ndltd.ncl.edu.tw/handle/91802707047909409871 The Black Hole Attack in Sensor Networks 感測網路的黑洞攻擊研究 Hang-Yin Lai 賴航胤 碩士 銘傳大學 資訊管理學系碩士班 99 A sensor network is composed of a lot of tiny sensors, where each sensor can sense the environmental information such as temperature, humidity, pressure, etc. The collected information is forwarded through a specific routing architecture to the base station for further analysis. Applications of sensor networks include environmental detection, military operations, e-commerce etc. However, security mechanisms must be established first in the network to defend against malicious attacks when using in a hostile environment. In this paper, we are concerned with new security mechanisms for a serious attack called the black hole. Earlier, Ngai et al. have proposed a security mechanism for the black hole attack, based on analyzing the statistic data collected from sensors. That is, a region of the network will return fewer packets to the base station when it contains a black hole, and the base station may detect the black hole from that data anomaly. However, we point that their mechanism has three drawbacks: 1) The data anomaly observed from the statistical data may be caused by the random distribution of sensors but not any black hole. 2) The data anomaly may be caused by the quick change of the sensing environment. 3) The mechanism does not offer any real-time response upon detecting a black hole. As a result, we propose a new mechanism to overcome the above weaknesses by employing special type of sensors called the mobile node. Then, we observe that certain environments may not support mobile nodes, so we propose other mechanisms to defend against the black hole black by using the multiple-path routing architecture. Finally, we make a comparison between our mechanisms and mechanisms proposed earlier. Wen-Huei Chen 陳文輝 2011 學位論文 ; thesis 51 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 銘傳大學 === 資訊管理學系碩士班 === 99 === A sensor network is composed of a lot of tiny sensors, where each sensor can sense the environmental information such as temperature, humidity, pressure, etc. The collected information is forwarded through a specific routing architecture to the base station for further analysis. Applications of sensor networks include environmental detection, military operations, e-commerce etc. However, security mechanisms must be established first in the network to defend against malicious attacks when using in a hostile environment. In this paper, we are concerned with new security mechanisms for a serious attack called the black hole. Earlier, Ngai et al. have proposed a security mechanism for the black hole attack, based on analyzing the statistic data collected from sensors. That is, a region of the network will return fewer packets to the base station when it contains a black hole, and the base station may detect the black hole from that data anomaly. However, we point that their mechanism has three drawbacks: 1) The data anomaly observed from the statistical data may be caused by the random distribution of sensors but not any black hole. 2) The data anomaly may be caused by the quick change of the sensing environment. 3) The mechanism does not offer any real-time response upon detecting a black hole. As a result, we propose a new mechanism to overcome the above weaknesses by employing special type of sensors called the mobile node. Then, we observe that certain environments may not support mobile nodes, so we propose other mechanisms to defend against the black hole black by using the multiple-path routing architecture. Finally, we make a comparison between our mechanisms and mechanisms proposed earlier.
author2 Wen-Huei Chen
author_facet Wen-Huei Chen
Hang-Yin Lai
賴航胤
author Hang-Yin Lai
賴航胤
spellingShingle Hang-Yin Lai
賴航胤
The Black Hole Attack in Sensor Networks
author_sort Hang-Yin Lai
title The Black Hole Attack in Sensor Networks
title_short The Black Hole Attack in Sensor Networks
title_full The Black Hole Attack in Sensor Networks
title_fullStr The Black Hole Attack in Sensor Networks
title_full_unstemmed The Black Hole Attack in Sensor Networks
title_sort black hole attack in sensor networks
publishDate 2011
url http://ndltd.ncl.edu.tw/handle/91802707047909409871
work_keys_str_mv AT hangyinlai theblackholeattackinsensornetworks
AT làihángyìn theblackholeattackinsensornetworks
AT hangyinlai gǎncèwǎnglùdehēidònggōngjīyánjiū
AT làihángyìn gǎncèwǎnglùdehēidònggōngjīyánjiū
AT hangyinlai blackholeattackinsensornetworks
AT làihángyìn blackholeattackinsensornetworks
_version_ 1718051010549645312