International Journal of Engineering and Innovative Technology (IJEIT)
In networking, black holes refer to places in the network where incoming traffic is silently discarded (or "Dropped"), without informing the source that the data did not reach its intended recipient. The black hole attack is one of the simplest routing attacks in WSNs. In a black hole attack, the attacker swallows (i.e., receives but does not forward) all the messages he receives. As a result any information that enters the black hole region is captured. Several techniques based on secret sharing and multipath routing has been proposed in the literature to overcome black hole attacks in the network. However, these techniques are not very effective.