A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks  
  Authors : Sara Kamari; Mojtaba Jamshidi

 

Selective forwarding attack is a dangerous attack in wireless sensor networks, in which a malicious node attempts to drop some incoming packets. This means that it refuses to forward them to destination. Selective forwarding attack has a highly destructive impact on multi-hop routing protocols in wireless sensor networks and decreases the packets delivery ratio to sinks. This paper proposes a secure routing protocol against selective forwarding attack in wireless sensor networks. The main idea of the proposed algorithm is to establish a cell structure within the network so that W=1 node plays the monitoring role in each cell that monitors activities of the remaining nodes in the cell. By overhearing traffic within the cell, the observer nodes find out whether the nodes are maliciously drop packets. If the observer nodes recognize that a node is malicious and does not forward the incoming packet to the destination, they will alter the path of the packets. The proposed algorithm was implemented and its performance was compared with four existing algorithms in terms of packet delivery ratio to the sink. The results of the comparison show that the proposed algorithm has better performance.

 

Published In : IJCAT Journal Volume 3, Issue 8

Date of Publication : August 2016

Pages : -- 396 - 403

Figures :04

Tables : 01

Publication Link :A Secure Algorithm against Selective Forwarding Attack in Wireless Sensor Networks

 

 

 

Sara Kamari : received the both B.S. and M.S. degrees in Computer Engineering from the Islamic Azad University, Kermanshah, Iran, in 2012 and 2015, respectively. Her research interests include wireless Sensor Networks and Security.

Mojtaba Jamshidi : received the B.S. degree in Computer Engineering from the Academic Center of Education, Kermanshah, Iran, in 2009, and M.S. degree in Computer Engineering from the Islamic Azad University, Qazvin, Iran, in 2012. His research interests include Computer networks, learning systems, Security, Data Mining, and Recommender Systems.

 

 

 

 

 

 

 

wireless sensor networks, overhear mechanism, cellular, observer nodes, selective forwarding attack

This paper proposed a new routing algorithm to be resistant against selective forwarding attack. The proposed algorithm uses a cell structure with overhear mechanism through the monitoring nodes mechanism to remove malicious nodes from data routes to the sink. The performance of the proposed algorithm was evaluated in terms of memory, communication and processing overhead. Its performance was also evaluated by simulation in terms of packet delivery ratio to the sink. The results were compared with four other algorithms that indicate the superiority of the proposed algorithm.

 

 

 

 

 

 

 

 

 

[1] Akyildiz Ian F. and Kasimoglu Ismail H.,"Wireless sensor and actor networks: research challenges", in: Proceedings of the Ad Hoc Networks 2, pp. 351–367, 2004. [2] Karlof C. And Wagner D., “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, in: Proceedings of the Ad Hoc Networks, pp. 299-302, 2003. [3] Sharma K. and et al., ”A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”, in: Proceedings of the International Journal of Advanced Science and Technology, Vol. 17, April, 2010. [4] Mohammadi S., Atani R. E. and Jadidoleslamy H., “A Comparison of Link Layer Attacks on Wireless Sensor Networks”, in: Proceedings of the Journal of Information Security, pp. 69-84, April 2011. [5] Yu B. and Xiao B., “Detecting selective forwarding attacks in wireless sensor networks”, In: Proceedings of the Second International Workshop on Security in Systems and Networks (IPDPS Workshop), pp. 1-8, April 2006. [6] Xiao B., Yu B. and Gao C., “CHEMAS: identify suspect nodes in selective forwarding attacks”, In: Proceedings Of the Journal of Parallel and Distributed Computing, Vol. 67, No. 11, pp. 1218-1230., June 2007. [7] Bysani L. K. and Turuk A. K., “A Survey On Selective Forwarding Attack in Wireless Sensor Networks”, In: Proceedings of the International Conference on Device and Communications (ICDeCom), Mesra, india, February 2011. [8] Kkan W. Z., Xiang Y. and Aalsalem M. Y., “Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks”, In: Proceedings of the I.J. Computer Network and Information Security, p. 1-10, February 2011. [9] Kaplantzis S., Shilton A, Mani N. and Sekercioglu Y., “Detecting selective forwarding attacks in wireless sensor networks using support vector machines”, in: Proceedings of the IEEE 3rd International Conference Intelligent Sensors, Sensor Networks and Information(ISSNIP), pp. 335 –340, December 2007. [10] Sun H.-M., Chen C.-M. and Hsiao Y.-C., “An efficient countermeasure to the selective forwarding attack in wireless sensor networks”, in: Proceedings of the IEEE TENCON 2007, pp. 1-4, October 2007. [11] Lee H. Y. and Cho T. H., “Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks”, in: Proceedings of the Ubiquitous Intelligence and Computing, pp. 535-544 ,Hong Kong, China, Springer-Verlag, pp. 535-544, 2007. [12] Hai T. H. and Huh E.-N., “Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge”, In: Proceedings of the Seventh IEEE International Symposium on Network Computing and Applications, pp.325-331, 2008. [13] Brown J.and Du X., “Detection of selective forwarding attacks in heterogeneous sensor networks”, in: Proceedings of the IEEE International Conferece on Communications, pp. 1583-1587, May 2008. [14] Lei X., Yong-jun H., Yong P. and Yue-Fei Z., “A Polynomialbased Countermeasure to Selective Forwarding Attacks in Sensor Networks”, In: Proceedings of the International Conference on Communications and Mobile Computing, pp.455- 459, 2009. [15] Tumrongwittayapak C. and Varakulsiripunth R., “Detecting Sinkhole Attack And Selective Forwarding Attack In Wireless Sensor Networks”, in: Proceedings of the 7th International Conference on Information, Communications and Signal Processing (ICICS 2009), pp. 1-5, December 2009. [16] Li G., Liu X. and Wang C., “A Sequential Mesh Test based Selective Forwarding Attack Detection Scheme in Wireless Sensor Networks”, in: Proceedings of the International Conference on Networking, Sensing and Control (ICNSC), pp. 554-558, April 2010. [17] Xin-sheng W., Yong-zhao Z., Shu-ming X. and Liangmin W., ”Lightweight defense scheme against Selective forwarding attacks in wireless sensor networks”, in: Proceedings of the IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC '09), pp. 226-232, October 2009. [18] Zhang Y., and Minier M.," Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures", Journal of Computer Networks and Communications Volume 2012 (2012). [19] Jamshidi, M., Esnaashari, M. and Meybodi, M. R., "Utilizing Learning Automata for Defending Against Selective Forwarding in Wireless Sensor Networks", The CSI Journal on Computer Science & Engineering, Vol. 11, No. 3, pp. 31-39, 2013. [20] Hu Y., Wu Y. and Wang H.," Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN", Wireless Sensor Network,Vol. 6,pp. 237-248, 2014. [21] S. Zhong, L. Li, Y. G. Liu, and Y. R. Yang. "Privacy-preserving locationbased services for mobile users in Wireless Networks", in: Proceedings of the Technical Report YALEU/DCS/TR-1297, Yale Computer Science, July 2004. [22] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”, in: Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255-265, 2000. [23] Srinivasan A. and et al., “DRBTS: Distributed Reputation-based Beacon Trust System”, Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'06), 2006. [24] Tumrongwittayapak C. and Varakulsiripunth R., “Detecting Sinkhole Attacks In Wireless Sensor Networks”, in: Proceedings of the International Joint Conference ICROS-SICE, August 18-21, Fukuoka International Congress Center, Japan, 2009. [25] Ronghui H. and et al., “Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes”, World Academy of Science, Engineering and Technology (55), 2009. [26] Zhu S., Setia S. and Jajodia S., “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks”, n: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), pp.62-72, 2003.