Review of Enhanced Secure AODV for Real-Time loT WSN Applications under Black Hole and Selective Forwarding Attacks

Main Article Content

Abhishek Chouhan, Professor Amit Thakur

Abstract

Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks.

Article Details

How to Cite
Abhishek Chouhan, Professor Amit Thakur. (2026). Review of Enhanced Secure AODV for Real-Time loT WSN Applications under Black Hole and Selective Forwarding Attacks. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 3(1), 1300–1307. Retrieved from https://ijarmt.com/index.php/j/article/view/937
Section
Articles

References

Ramesh, R. B., Thangaraj, S. J. J., Sagayee, G. M. A., & Saravanan, K. (2025). Detection and prevention in WSN security framework using deep learning against black hole and wormhole attacks. Ain Shams Engineering Journal, 16(10), 103624.

Satori, H. (2024). Machine learning attack detection based-on stochastic classifier methods for enhancing of routing security in wireless sensor networks. Ad Hoc Networks, 163, 103581.

Sangaiah, A. K., Javadpour, A., Ja’fari, F., Pinto, P., Ahmadi, H., & Zhang, W. (2022). CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities. Microprocessors and Microsystems, 90, 104504.

Jain, J. K., & Chauhan, D. (2025). Optimized secure and energy-efficient approach for IoT-enabled wireless sensor networks. Pervasive and Mobile Computing, 110, 102049.

Babu, E. S., Padma, B., Nayak, S. R., Mohammad, N., & Ghosh, U. (2023). Cooperative IDS for Detecting Collaborative Attacks in RPL-AODV Protocol in Internet of Everything. Journal of Database Management (JDM), 34(2), 1-33.

Dhand, G., Rao, M., Chaudhary, P., & Sheoran, K. (2025). A secure routing and malicious node detection in mobile Ad hoc network using trust value evaluation with improved XGBoost mechanism. Journal of Network and Computer Applications, 235, 104093.

Mali, S. D., & Govinda, K. (2023). A study on network routing attacks in IoT. Materials Today: Proceedings, 80, 2997-3002.

Ceviz, O., Sadioglu, P., Sen, S., & Vassilakis, V. G. (2025). A novel federated learning-based IDS for enhancing UAVs privacy and security. Internet of Things, 31, 101592.

Fan, N., Wu, C., Benabdallah, S., Li, J., Gao, Y., & Wang, Q. (2024). On a security scheme against collusive attacks in vehicular ad hoc networks. Vehicular Communications, 49, 100821.

Yang, Z., Li, L., Gu, F., Ling, X., & Hajiee, M. (2022). TADR-EAODV: A trust-aware dynamic routing algorithm based on extended AODV protocol for secure communications in wireless sensor networks. Internet of Things, 20, 100627.

Mishra, R. (2024). Raspberry Pi Performance analysis across its Operating System in LED Control Operation. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 1(2), 01-11.

Mishra, R. (2025). IOT and DSP (combination of hardcore Virtex-5 FPGA and soft core DSP processor) OFDM System PAPR Reduction Using Artificial Intelligence Algorithm. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 2(1), 135-149.

Mishra, R., & Sharma, A. (2026). Enhanced Trajectory Tracking of a 6-DOF Robotic Manipulator Using GA–PID and ANN–PID Controllers. International Journal of Research & Technology, 14(2), 53-70.

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.