International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Novel Technique for Blackhole Discernment Employing Big Data Analytics in IoT Networks

Author NameAuthor Details

Gauri Mathur, Wiqas Ghai

Gauri Mathur[1]

Wiqas Ghai[2]

[1]School of Computer Science and Engineering, RIMT University, Mandi Gobindgarh, Punjab, India

[2]School of Computer Science and Engineering, RIMT University, Mandi Gobindgarh, Punjab, India

Abstract

Internet of Things is connection of equipment, machine, software and everything around us to make smart things which have unique IP address to distinguish from other things. In Internet of Things everyday objects have capabilities to identify, sense and process the data so they can communicate with each other generating huge volumes of data. But data security is the major issue as when communication takes place the data can be altered through malicious attacks taking place on network while the data is being transmitted from different devices. So, in this paper a novel totalitarian approach is proposed for detection of blackhole attack which drops the packets being transmitted in the network leading to hacking and loss of data. So, in order to eliminate this DoS attack from the network proposed technique can be used where occurrence of malicious infected path results in initiation of request sent by any local node to all of its neighbor’s node for verifying the presence of the malicious path in their routing tables which has a high percentage of usage. We have used the approach of a modified routing table along with analysis of the threshold value generated by nodes which generates huge volume of big data and variation in amount of data generated by malicious nodes we can identify suspicious links before the attack is initiated and starts disturbing within the network. This is done to establish legitimacy of the node and on the corroboration of a malicious attack a blacklisting message is broadcasted to exclude the colluder nodes from the network. Results and analysis of this technique is been done on the basis of packet delivery ratio, throughput, power consumption and congestion control. Along with this comparative analysis of this technique is done with the other existing techniques proposed by various renowned researchers for identifying these blackhole attacks taking place in IoT Networks. The proposed technique makes use of a modified routing table and utilizes Big Data analytics to accurately ascertain the blackhole nodes in the IoT network. The detection and isolation of colluder nodes is being done accurately with minimalistic consumption of resources as opposed to some of the existing techniques, which may require high power consumption, synchronization, as well as other resources thereby making these techniques resource intensive. Since this technique makes use of multivariate parameter, it is more resilient to faults. Our approach also aims to alleviate the security and privacy concerns associated with big data thereby being a potential flag winner for the organizations.

Index Terms

Blackhole Attack

Internet of Things

Big Data

Malicious Node

Cooja Simulator

Big Data Analytics

Reference

  1. 1.
    Hameed, Sufian, Faraz Idris Khan, and Bilal Hameed. "Understanding security requirements and challenges in Internet of Things (IoT): A review." Journal of Computer Networks and Communications 2019 (2019).
  2. 2.
    Yaqoob, Ibrar, Ejaz Ahmed, Ibrahim Abaker Targio Hashem, Abdelmuttlib Ibrahim Abdalla Ahmed, Abdullah Gani, Muhammad Imran, and Mohsen Guizani. "Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges." IEEE wireless communications 24, no. 3 (2017): 10-16.
  3. 3.
    Bhavadharini, R. M., S. Karthik, N. Karthikeyan, and Anand Paul "Wireless networking performance in IoT using adaptive contention window." Wireless Communications and Mobile Computing 2018 (2018).
  4. 4.
    M. Mahmud Hossain, M.Fotouhi, and R. Hasan, “Towards an Analysis of Security Issues, Challenges and Open Problems in the Internet of Things,” in Services (SERVICES), 2015 IEEE World Congress on. IEEE, 2015, pp.21-28
  5. 5.
    Sharma, Neha, Usha Batra, and Sherin Zafar. "A neoteric swarm intelligence stationed IOT–IWD algorithm for revolutionizing pharmaceutical industry leading to digital health." In Emergence of Pharmaceutical Industry Growth with Industrial IoT Approach, pp. 1-19. Academic Press, 2020
  6. 6.
    Li, L. Da Xu, and S. Zhao, “The Internet of Things: A Survey,” in [Information Systems Frontiers], ©[Springer]. doi: [10.1007/s10796-014-9492-7], New York, 2014, pp.243-299.
  7. 7.
    Bhavadharini, R. M., S. Karthik, N. Karthikeyan, and Anand Paul. "Wireless networking performance in IoT using adaptive contention window." Wireless Communications and Mobile Computing 2018 (2018).
  8. 8.
    Bashir, Muhammad Rizwan, and Asif Qumer Gill. "Towards an IoT big data analytics framework: smart buildings systems." In 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1325-1332. IEEE, 2016.
  9. 9.
    Lee, Carman KM, C. L. Yeung, and M. N. Cheng. "Research on IoT based cyber physical system for industrial big data analytics." In 2015 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1855-1859. IEEE, 2015.
  10. 10.
    Lee, Jay, Hossein Davari Ardakani, Shanhu Yang, and Behrad Bagheri. "Industrial big data analytics and cyber- physical systems for future maintenance & service innovation." Procedia Cirp 38 (2015): 3-7
  11. 11.
    Yasin, Adwan, and Mahmoud Abu Zant. "Detecting and isolating black-hole attacks in MANET using timer based baited technique." Wireless Communications and Mobile Computing 2018 (2018).
  12. 12.
    Dumne, P.R. and Manjaramkar, A., 2016, September. Cooperative bait detection scheme to prevent collaborative blackhole or grayhole attacks by malicious nodes in MANETs. In 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 486-490). IEEE.
  13. 13.
    P.-C. Tsou, J.-M. Chang, Y.-H. Lin, H.-C. Chao, and J.-L. Chen, “Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs,” in Proceedings of the 13th International Conference on Advanced Communication Technology: Smart Service Innovation through Mobile Interactivity, ICACT 2011, pp. 755–760, Seoul, Republic of Korea, February 2011.
  14. 14.
    B. Singh, D. Srikanth, and C. R. S. Kumar, “Mitigating effects of black hole attack in mobile Ad-Hoc NETworks: Military perspective,” in Proceedings of the 2nd IEEE International Conference on Engineering and Technology, ICETECH 2016, pp. 810–814, Coimbatore, India, March 2016.
  15. 15.
    A. R. Rajeswari, K. Kulothungan, and A. Kannan, “GNB-AODV: guard node based –aodv to mitigate black hole attack in MANET,” International Journal of Scientific Research in Science, Engineering and Technology, vol. 2, no. 6, pp. 671–677, 2016.
  16. 16.
    S. R. Deshmukh, P. N. Chatur, and N. B. Bhople, “AODV-Based secure routing against blackhole attack in MANET,” in Proceedings of the 1st IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology, RTEICT 2016, pp. 1960–1964, Bangalore, India, May 2016.
  17. 17.
    S. Dhende, S. Musale, S. Shirbahadurkar, and A. Najan, “SAODV: Black hole and gray hole attack detection protocol in MANETs,” in Proceedings of the 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), pp. 2391–2394, Chennai, India, March 2017.
  18. 18.
    M. Sathish, K. Arumugam, S. N. Pari, and V. S. Harikrishnan, “Detection of single and collaborative black hole attack in MANET,” in Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016, pp. 2040–2044, Chennai, India, March 2016.
  19. 19.
    Ali, Shoukat, et al. "Detection and prevention of Black Hole Attacks in IOT & WSN." 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC). IEEE, 2018.
  20. 20.
    Weingartner, Elias, Hendrik Vom Lehn, and Klaus Wehrle. "A performance comparison of recent network simulators." In 2009 IEEE International Conference on Communications, pp. 1-5. IEEE, 2009
  21. 21.
    Guptha, Y.P.K. and Madhu, M., 2017. Improving security and detecting black hole attack in wireless sensor network. International Journal of Professional Engineering Studies, 8(5), pp.260-265.
  22. 22.
    Otoum, S., Kantarci, B. and Mouftah, H.T., 2017, May. Hierarchical trust-based black-hole detection in WSN-based smart grid monitoring. In 2017 IEEE international conference on communications (ICC) (pp. 1-6). IEEE.
  23. 23.
    Chhabra, A., Vashishth, V. and Sharma, D.K., 2017, March. A game theory based secure model against black hole attacks in opportunistic networks. In 2017 51st Annual conference on information sciences and systems (CISS) (pp. 1-6). IEEE.
  24. 24.
    P. Hemalatha, J. Vijithaananthi, “An Effective Performance For Denial Of Service Attack (DoS) Detection” IEEE, International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)”, pp 229 – 233, Palladam, India, 10 – 11 February 2017.
  25. 25.
    Abdullah Aljumah, Tariq Ahamed Ahanger, “Futuristic Method to Detect and Prevent Black-Hole Attack in Wireless Sensor Networks” IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.2, 05 February 2017.
  26. 26.
    Saurabh Sharma, Dr. Sapna Gambhir, “CRCMD&R: Cluster and Reputation based Cooperative Malicious Node Detection & Removal Scheme in MANETs”, IEEE, 11th International Conference on Intelligent Systems and Control (ISCO), pp 36 – 340, Coimbatore,India, 5-6 January 2017.
  27. 27.
    Mert Melih Ozcelik, Erdal Irmak, Suat Ozdemir “A Hybrid Trust Based IDS for WSN” IEEE, Networks, Computers andCommunications (ISNCC), pp 1 – 6, Marrakech, Morocco, 16-18 May 2017
  28. 28.
    Gurjinder Kaur1, V.K. Jain, Yogesh Chaba “Detection and Prevention of Black hole Attacks in WSN” Springer, International Conference on Intelligent, Secure, Dependable Systems in Distributed and Cloud Environments (ISDDC), pp 118-126, Vancouver, BC, Canada, 25-27October 2017.
  29. 29.
    Marjani, Mohsen, Fariza Nasaruddin, Abdullah Gani, Ahmad Karim, Ibrahim Abaker Targio Hashem, Aisha Siddiqa, and Ibrar Yaqoob. "Big IoT data analytics: architecture, opportunities, and open research challenges." ieee access 5 (2017): 5247-5261.
  30. 30.
    Hameed, Sufian, and Usman Ali. "Efficacy of live DDoS detection with Hadoop." In NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, pp. 488-494. IEEE, 2016.
SCOPUS
SCImago Journal & Country Rank