Abstract: In a Wireless Sensor Networks (WSNs), energy consumption is a key challenge due to its dynamic
topology and resource constraint sensors. It uses the wireless connection to be configured with the network
security is the main concern in the network communication. Because of its special characteristics, it becomes
more susceptible to attacks. It has dynamic topology, so that any node engaging in the network connection can
join and leave at anytime. Due to the nature of this topology, the network will be overwhelmed by various
security threats. In this paper we have discussed about the black hole attack. One of the common security
attack resembles on the Wireless Sensor Network is the black hole attack in which the packets are consumed by
the malicious nodes which is very crucial to detect and prevent. Black hole attack is also called as packet
dropping attack or network layer attack. It is one of denial of service (DOS) attack. Due to this type of black
hole attack, most of the packet gets discarded without reaching the destination. Due to the presence of black
hole attacks the network performance gets degraded to an extent. In this paper, we will see how to implement
the black hole attack in AODV routing protocol and modified AODV (MAODV) routing protocol. Here the
trust based energy efficient secure routing protocol is proposed to mitigate the presence of black hole attacks
and it gets simulated using ns-3.21 and the simulation results are discussed. The parameter investigated in this
paper is to reduce the power consumption using ns-3.21 simulator without degrading its performance.
Keywords: MANET (Mobile Ad-hoc Network), AODV (Ad-hoc On Demand Distance Vector Routing), MAODV,
Black hole, NS3, RREQ, RREP
I.INTRODUCTION
21
22
V.EXISTING METHOD
1.
2.
23
VII.SIMULATION RESULTS
By using this Trust based energy efficient secure
routing protocol, the energy consumption gets reduced. The
simulation is done using Ns-3.21 simulator.
A.1 Energy consumption
VII.CONCLUSION
A malicious node can reduce the ratio of end to
end delivery. We propose an energy efficient and simple
approach for defending the Modified AODV protocol
against Black Hole attacks. The Proposed method can be
A.2 Identification of malicious node
used to find the secured routes and prevent the black hole
The simulation is done using Ns-3.21 simulator. nodes in the Wireless Sensor Networks by maintaining the
trust value and selecting the higher energy node.
The malicious node is identified and it is shown in fig.4.
The trust value for each node gets computed
periodically by monitoring the transmission between nodes.
In addition, the proposed solution may be used to maintain
the identity of the malicious nodes and rejects it from
routing table. By using this method, the energy
consumption gets decreased.
Fig.3.Energy consumption comparison
REFERENCES
25
26