Research on Selective Forwarding Attack Detection Scheme in Wireless Sensor Networks

Article Preview

Abstract:

Selective forwarding attacks in wireless sensor networks may corrupt some mission critical applications such as military surveillance and critical facilities monitoring. They are very difficult to be detected and distinguished from normal packet drops in wireless sensor networks. We propose an improved sequential mesh test based detection scheme in this paper. The scheme extracts a small quantity of samples to run the test, instead of regulating the total times of test in advance. We show through experiments that our scheme can provide higher detection accurate rate and lower false alarm rate than the existing detection schemes. Meanwhile, less communication and computation power are required to detect the selective forwarding attacks.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

5298-5302

Citation:

Online since:

January 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C. Karlof and D. Wagner: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks Vol. 1 (2003), pp.293-315.

DOI: 10.1016/s1570-8705(03)00008-8

Google Scholar

[2] J. Walters, Z. Liang, W. Shi and V. Chaudhary, in: Wireless Sensor Networks Security: a Survey, edited by Y. Xiao CRC Press, Boca Raton, FL (2006), in press.

Google Scholar

[3] H. Sun, C. Chen and Y. Hsiao: An Efficient Countermeasure to the Selective Forwarding Attack in Wireless Sensor Networks, edited by J.F. Wang, volume 1 of IEEE Region 10 Annual International Conference, IEEE (2007).

DOI: 10.1109/tencon.2007.4428866

Google Scholar

[4] G. Li, J. He and Y. Fu: Group-based Intrusion Detection System in Wireless Sensor Networks. Computer Communications Vol. 31 (2008), pp.4324-4332.

DOI: 10.1016/j.comcom.2008.06.020

Google Scholar

[5] B. Carbunar, I. Ioannidis and C. Nita-Rotaru: JANUS: towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks, edited by M. Jakobsson and A. Perrig, volume 1 of the 3rd ACM Workshop on Wireless Security, ACM (2004).

DOI: 10.1145/1023646.1023649

Google Scholar

[6] B. Yu and B. Xiao: Detecting Selective Forwarding Attacks in Wireless Sensor Networks, edited by P. Spirakis and H.J. Siegel, volume 1 of the 20th International Parallel and Distributed Processing Symposium, IEEE (2006).

DOI: 10.1109/ipdps.2006.1639675

Google Scholar

[7] B. Yu and B. Xiao: CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks. Journal of Parallel and Distributed Computing Vol. 67 (2007), pp.1218-1230.

DOI: 10.1016/j.jpdc.2007.04.014

Google Scholar

[8] K. Ioannis and T. Dimitriou: Toward Intrusion Detection in Sensor Networks, edited by A. Sibille, volume 1 of the 13th European Wireless Conference, VDE (2007).

Google Scholar

[9] S. Kaplantzis, A. Shilton, N. Mani and Y. Sekercioglu: Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines, edited by M. Palaniswami, S. Marusic and Y.W. Law, volume 1 of the 3rd Conference of Intelligent Sensors Sensor Networks and Information Processing, IEEE (2007).

DOI: 10.1109/issnip.2007.4496866

Google Scholar

[10] J. Brown and X. Du: Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks, edited by K. Gong, K. Letaief and Z. Niu , volume 1 of International Conference on Communications, IEEE (2008).

DOI: 10.1109/icc.2008.306

Google Scholar

[11] G. Li, X. Liu and C. Wang: A Sequential Mesh Test based Selective Forwarding Attack Detection Scheme in Wireless Sensor Networks, edited by H. Darabi, volume 1 of the 2010 IEEE International Conference on Networking, Sensing and Control, IEEE (2010).

DOI: 10.1109/icnsc.2010.5461599

Google Scholar