Sinkhole and Black Hole Attack Detection Using Dynamic Reliability Based Anomaly Architecture for Sensor Networks
DOI:
https://doi.org/10.52783/jns.v14.1726Keywords:
Dynamic reliability, Black hole attack, Network integrity, sink hole attack, Security.Abstract
In this paper wireless sensor networks endure disruption of communication functions and attacks on network integrity stemming from sinkhole and black hole threats. Active attack scenarios allow malicious nodes to damage network performance and lose data packet information by directing packets incorrectly and discarding them. Traditional security technology fails to stop attacks because it cannot match the evolving speed of large network spaces. We use a Dynamic Reliability based Anomaly Architecture (DRA) which assesses network node trustworthiness through network behavior analysis and characteristic interaction evaluations. Through constant reliability scoring adjustments the system detects sinkhole effectors and blocks black hole network intrusions. Combination of real-time tracking of node activities with dynamic network situation evaluation forms the basis of this security-enhanced network protection strategy. Latest research proves networks implementing dynamic reliability mechanisms successfully protect against sinkhole and black hole attacks by keeping the proportion of false positives to a minimum thus improving security detection performance. This architecture creates a scalable solution to effectively extend protection throughout wireless sensor networks for multiple future applications. The upgraded system produces higher performance compared to conventional methods through enhanced precision and better adaptability while reducing power consumption.
Downloads
Metrics
References
Ahmad, M., & Khan, M. A. (2024). Sinkhole Attack Detection by Enhanced Reputation-Based Intrusion Detection System. IEEE Transactions on Network and Service Management. doi:10.1109/TNSM.2024.10562222
Anwar, R. W., Bakhtiari, M., Zainal, A., & Qureshi, K. N. (2016). Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks. Jurnal Teknologi, 78(4-3).
Baskar, R., Raja, K., Joseph, C., & Reji, M. (2017). Sinkhole attack in wireless sensor networks-performance analysis and detection methods. Indian Journal of Science and Technology, 10(12), 1-8.
Ali, A., & Hussain, M. (2022). Improving Sinkhole Attack Detection Rate in IoT Networks Using Reputation-Based Techniques. Journal of Cybersecurity Research and Applications, 8(3), 45-63. doi:10.1080/23299574.2022.1568903
Arif, M., & Khan, A. (2021). Reputation-Based Detection Mechanism for Sinkhole Attacks in IoT Networks. Internet of Things, 14, 100383. doi:10.1016/j.iot.2021.100383
Banerjee, T., & Mukherjee, P. (2017). Trust and Reputation Mechanisms for Wireless Sensor Networks: An Adaptive Approach. Wireless Networks, 23(7), 1913-1927. doi:10.1007/s11276-016-1275-x
Choi, H., & Lee, S. (2017). Reputation-Based Framework for High Integrity Sensor Networks. IEEE Access, 5, 25194-25203. doi:10.1109/ACCESS.2017.2779922
Farooq, A., & Rehman, A. (2019). Trust-Based Intrusion Detection System for Wireless Sensor Networks. Journal of Sensor and Actuator Networks, 8(2), 18. doi:10.3390/jsan8020018
Gupta, A., & Singh, R. (2017). Reputation-Based Framework for Secure Routing in Wireless Sensor Networks. Journal of Information Security, 8(3), 183-197.
Gupta, A., & Verma, P. (2018). Mitigating Black Hole Attacks in MANETs Using a Trust-Based Threshold Mechanism. Journal of Advanced Research in Dynamical and Control Systems, 10(5), 112-125.
Ahmed, N., & Malik, S. (2018). Reputation Systems for Wireless Sensor Networks: A Comprehensive Review. Journal of Ambient Intelligence and Humanized Computing, 9(6), 2135-2156. doi:10.1007/s12652-017-0617-x
Khan, F. A., & Ali, I. (2018). Dynamic Reputation-Based Intrusion Detection System for MANETs. Future Generation Computer Systems, 86, 709-720. doi:10.1016/j.future.2018.03.019
Malik, F., & Zahid, S. (2021). Reputation-Based Intrusion Detection Framework for IoT Networks. Computer Networks, 193, 108111. doi:10.1016/j.comnet.2021.108111
Sharma, R., & Joshi, A. (2018). Trust-Based Reputation Framework for Detection of Blackhole Attacks. International Journal of Security and Its Applications, 12(3), 39-50.
Singh, D., & Chauhan, S. (2019). An Adaptive Trust-Based Framework for Wireless Sensor Networks. Ad Hoc Networks, 89, 21-35. doi:10.1016/j.adhoc.2018.12.015
Sharma, S., & Verma, P. (2023). Reputation-Based Detection of Sinkhole Attacks Using Machine Learning. Journal of Ambient Intelligence and Humanized Computing, 14(3), 435-452. doi:10.1007/s12652-022-03638-1
Meleshko, A., & Desnitsky, V. (2024, February). The Modeling and Detection of Attacks in Role-Based Self-Organized Decentralized Wireless Sensor Networks. In Telecom (Vol. 5, No. 1, pp. 145-175). MDPI.
Yang, X., & Zhang, Y. (2020). Reputation-Based Mechanisms for Secure Routing in MANETs. Journal of Network and Computer Applications, 123, 67-75. doi:10.1016/j.jnca.2018.12.007
Kumar, S., & Singh, P. (2019). Secure Reputation-Based Routing Protocol for MANETs. Journal of Communications and Networks, 21(5), 410-420. doi:10.1109/JCN.2019.000043
Mehta, A., & Gupta, S. (2020). Adaptive Reputation-Based Secure Framework for IoT Applications. IEEE Internet of Things Journal, 7(4), 3291-3304. doi:10.1109/JIOT.2020.2965851
Zhou, X., & He, S. (2021). Reputation-Based Secure Routing Protocol for Wireless Sensor Networks. Journal of Network and Computer Applications, 181, 102974. doi:10.1016/j.jnca.2021.102974
Zhang, F. J., Zhai, L. D., Yang, J. C., & Cui, X. (2014). Sinkhole attack detection based on redundancy mechanism in wireless sensor networks. Procedia computer science, 31, 711-720.
Raj, S., & Kumar, M. (2016). Reputation-Based Detection of Routing Attacks in Ad Hoc Networks. Procedia Computer Science, 89, 689-695. doi:10.1016/j.procs.2016.06.051
Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access, 7, 33859-33869.
Dhanaraj, R. K., Krishnasamy, L., Geman, O., & Izdrui, D. R. (2021). Black hole and sink hole attack detection in wireless body area networks. Computers, Materials & Continua, 68(2), 1949-1965.
Sharma, P., & Mehta, A. (2020). Reputation-Based Trust Management in Wireless Sensor Networks. Sensors, 20(15), 4293. doi:10.3390/s20154293
Singh, S., & Kumar, D. (2021). Adaptive Trust Evaluation for Secure Routing in Wireless Sensor Networks. Computer Communications, 165, 1-10. doi:10.1016/j.comcom.2020.12.003
You, X., Hou, F., & Chiclana, F. (2024). A reputation-based trust evaluation model in group decision-making framework. Information Fusion, 103, 102082.
De Meo, P., Messina, F., Postorino, M. N., Rosaci, D., & Sarné, G. M. (2017, May). A reputation framework to share resources into iot-based environments. In 2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC) (pp. 513-518). IEEE.
Gupta, S., & Verma, A. (2016). Adaptive Reputation-Based Secure Framework for Sensor Networks. Journal of Cybersecurity, 12(4), 115-133.
Kaushik, I., & Sharma, N. (2020). Black hole attack and its security measure in wireless sensors networks. Handbook of wireless sensor networks: issues and challenges in current Scenario's, 401-416.
Kim, J., & Park, J. (2022). Adaptive Trust Management Mechanism for IoT Sensor Networks. Journal of Sensors, 2022, 1-10. doi:10.1155/2022/6658438
Malik, R., & Kumar, P. (2021). Detection and Mitigation of Smart Blackhole and Gray Hole Attacks in VANET Using Dynamic Time Warping. Wireless Personal Communications, 120(1), 1-19. doi:10.1007/s11277-021-09390-3
Mantas, N., Louta, M., Karapistoli, E., Karetsos, G. T., Kraounakis, S., & Obaidat, M. S. (2017). Towards an incentive‐compatible, reputation‐based framework for stimulating cooperation in opportunistic networks: a survey. Iet Networks, 6(6), 169-178.
Nayak, R., & Singh, P. (2020). Adaptive Reputation-Based Clustering for Intrusion Detection in Sensor Networks. Cluster Computing, 23(4), 3075-3087. doi:10.1007/s10586-020-03083-5
Oztoprak, A., Hassanpour, R., Ozkan, A., & Oztoprak, K. (2024). Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Computing Surveys, 57(4), 1-29.
Patel, R., & Patel, M. (2022). Adaptive Trust Management for Heterogeneous Sensor Networks. Computers & Security, 121, 102798. doi:10.1016/j.cose.2022.102798
Pawar, M. V. (2023). Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM. International Journal of Pervasive Computing and Communications, 19(1), 124-153.
Ramesh, S., & Yaashuwanth, C. (2020). RETRACTED ARTICLE: Enhanced approach using trust based decision making for secured wireless streaming video sensor networks. Multimedia tools and applications, 79(15-16), 10157-10176.
Shanmugaraja, P., Bhardwaj, M., Mehbodniya, A., VALI, S., & Reddy, P. C. S. (2023). An Efficient Clustered M-path Sinkhole Attack Detection (MSAD) Algorithm for Wireless Sensor Networks. Adhoc & Sensor Wireless Networks, 55.
Singh, G., & Kaur, R. (2023). A Hybrid IDS for Detection and Mitigation of Sinkhole Attack in 6LoWPAN Networks. International Journal of Information Security Science, 12(2), 101-118. doi:10.1007/s10207-023-00763-2
Singh, M., & Roy, R. (2016). Reputation and Trust-Based Adaptive Security Framework for IoT Sensor Networks. Journal of Intelligent & Fuzzy Systems, 30(2), 1113-1125.
Wu, J., & Zhang, K. (2016). Distributed Reputation-Based Secure Localization in Sensor Networks. Journal of Information and Computation Science, 13(2), 321-338.
Yang, Z., & Liu, H. (2017). Trust and Reputation-Based Security Framework for Wireless Sensor Networks. Sensors, 17(6), 1281. doi:10.3390/s17061281
Jahandoust, G., & Ghassemi, F. (2017). An adaptive sinkhole aware algorithm in wireless sensor networks. Ad Hoc Networks, 59, 24–34. https://doi.org/10.1016/j.adhoc.2017.01.002
Zhou, P., Jiang, S., Irissappane, A., Zhang, J., Zhou, J., & Teo, J. C. M. (2015). Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Transactions on Information Forensics and Security, 10(3), 613-625.
Gojiya, J., Nayak, A., & Patel, B. (2016). An Enhanced Approach of Detection and Prevention of Black Hole Attack on AODV over MANET. International Journal of Computer Applications, 142(13), 9-11.
Kumar, R., & Shanmugam, A. (2017). Energy Efficient and Trust Based Black Hole Attack Identification Model in Wireless Sensor Networks. Journal of Network Security Computer Networks, 2(3), 1-9.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.