International Journal of Computer Networks and Applications (IJCNA) DOI: 10.22247/ijcna/2021/209995 Volume 8, Issue 5, September October (2021) ISSN: 2395-0455 ©EverScience Publications 682 RESEARCH ARTICLE A Novel Technique for Blackhole Discernment Employing Big Data Analytics in IoT Networks Gauri Mathur School of Computer Science and Engineering, RIMT University, Mandi Gobindgarh, Punjab, India gauri.mathur@lpu.co.in Wiqas Ghai School of Computer Science and Engineering, RIMT University, Mandi Gobindgarh, Punjab, India ghaialpha@gmail.com Received: 08 September 2021 / Revised: 13 October 2021 / Accepted: 17 October 2021 / Published: 27 October 2021 Abstract Internet of Things is connection of equipment, machine, software and everything around us to make smart things which have unique IP address to distinguish from other things. In Internet of Things everyday objects have capabilities to identify, sense and process the data so they can communicate with each other generating huge volumes of data. But data security is the major issue as when communication takes place the data can be altered through malicious attacks taking place on network while the data is being transmitted from different devices. So, in this paper a novel totalitarian approach is proposed for detection of blackhole attack which drops the packets being transmitted in the network leading to hacking and loss of data. So, in order to eliminate this DoS attack from the network proposed technique can be used where occurrence of malicious infected path results in initiation of request sent by any local node to all of its neighbor’s node for verifying the presence of the malicious path in their routing tables which has a high percentage of usage. We have used the approach of a modified routing table along with analysis of the threshold value generated by nodes which generates huge volume of big data and variation in amount of data generated by malicious nodes we can identify suspicious links before the attack is initiated and starts disturbing within the network. This is done to establish legitimacy of the node and on the corroboration of a malicious attack a blacklisting message is broadcasted to exclude the colluder nodes from the network. Results and analysis of this technique is been done on the basis of packet delivery ratio, throughput, power consumption and congestion control. Along with this comparative analysis of this technique is done with the other existing techniques proposed by various renowned researchers for identifying these blackhole attacks taking place in IoT Networks. The proposed technique makes use of a modified routing table and utilizes Big Data analytics to accurately ascertain the blackhole nodes in the IoT network. The detection and isolation of colluder nodes is being done accurately with minimalistic consumption of resources as opposed to some of the existing techniques, which may require high power consumption, synchronization, as well as other resources thereby making these techniques resource intensive. Since this technique makes use of multivariate parameter, it is more resilient to faults. Our approach also aims to alleviate the security and privacy concerns associated with big data thereby being a potential flag winner for the organizations. Index Terms Blackhole Attack, Internet of Things, Big Data, Malicious Node, Cooja Simulator, Big Data Analytics. 1. INTRODUCTION Internet of Things is connection of equipment, machine, software and everything around us to make these as smart things, which have unique IP address to distinguish from other things. Smart home, wearable, health care, smart environment are some examples of IoT applications. In paper [1] Internet of Things connects devices where everyday objects can be given capabilities of identifying, sensing, networking and processing capabilities so they can communicate with each other and transfer large amount of data. Figure 1 Communication of IoT Devices As shown in Figure 1 these physical devices consist of powerful sensors, have capability to communicate anywhere, anytime, with any internet connection, and can be used for any business purpose. The major advantage of using IoT is that it does not require any central governing authority and does not require huge infrastructure support. The popularity