Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 38, Pages: 1-7
S. S. Nagamuthu Krishnan1 * and P. Srinivasan2
1 Department of MCA, RV College of Engineering, Bangalore – 560059, Karnataka, India; [email protected]
2 VIT University, Vellore – 632014, Tamil Nadu, India; [email protected]
*Author for correspondence
Department of MCA
Background/Objectives: A typical Wireless Sensor Network (WSN) is a collection of Sensor nodes with limited charge that get deployed in a range enabling different applications. Enormous potential is there for deployment of WSN in consumer centric applications, industry sector and defence. Method: WSNs are vulnerable to various types of attack, upon which black-hole, a type of Denial of Service (DoS) pose enormous challenge in detection and defence. The primary characteristic of the attack is that reprogramming done by attackers in the captured nodes block the packets received than forwarding to the base station. This results in information entering the black hole area not getting routed to the destination and degradation of QoS factors of delay and final throughput. In this study a comparative performance weighing of Star and tree topology setup of WSN nodes is carried out under the black hole scenario. In case, the parameter of delay is vital Mesh setup is chosen and in the requirement of throughput efficiency and fault tolerance Star topology is chosen. A methodology for choosing the topology depending on the required service parameter under black hole scenario is also devised. Findings: The vital parameters considered for the simulation study are delay in transmission of packets and throughput efficiency among the sensor nodes. The results prove a considerable reduction of the parameter of delay in transmission of packets if hybrid topology is followed and a reasonable increase in the QoS parameter of throughput as mesh topology is adopted during transmission in a black hole vulnerable network. Improvements: The vital parameters of negligible delay and throughput efficiency that contribute effective cooperation among the sensor nodes are taken into account while choosing the appropriate topology, and the results show the distribution of the parameter values for the particular topology chosen.
Keywords: Black Hole Attacks, Delay, Denial of Service, Throughput, Topology
Subscribe now for latest articles and news.