International Journal of Computer Science and Management Studies (IJCSMS)
There are various possible security threats that may be experienced by a Wireless Sensor Network (WSN). Compromised-node and denial-of-service are two key attacks in Wireless Sensor Networks (WSNs). Both of these attacks generate black holes. In this paper, the authors study routing mechanisms that circumvent (bypass) black holes formed by these attacks. They argue that existing multi-path routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once an adversary acquires the routing algorithm, it can compute the same routes known to the source, and hence endanger all information sent over these routes.