2008 Seventh IEEE International Symposium on Network Computing and Applications 2008
DOI: 10.1109/nca.2008.13
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge

Abstract: Wireless sensor networks have many potential applications for both civil and military tasks. However, WSNs are susceptible to many types of attacks because they are deployed in open and unprotected environment. Selective forwarding attack is one of the easiest implement and damaged attacks in multi-hop routing protocols. In this paper, we proposed a lightweight detection algorithm based only on the neighborhood information. Our detection algorithm can detect selective forwarding attack with high accuracy and l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 71 publications
(24 citation statements)
references
References 25 publications
0
24
0
Order By: Relevance
“…Several works [6] [7] that used neighbor-based approach have been introduced in order to mitigate selective forwarding attacks. Lu et al [8] have proposed a neighbor-based monitoring mechanism.…”
Section: ) Neighbor-based Monitoringmentioning
confidence: 99%
“…Several works [6] [7] that used neighbor-based approach have been introduced in order to mitigate selective forwarding attacks. Lu et al [8] have proposed a neighbor-based monitoring mechanism.…”
Section: ) Neighbor-based Monitoringmentioning
confidence: 99%
“…Bogus message during reprogramming [28] Unsecure reprogramming process with bogus messages Sinkhole/blackhole [29][30][31][32] Shortest path, drop the packets External stimuli [33] Use external physical stimuli to create a large number of packets Selective forwarding [3,[34][35][36][37] Selectively drop the packets Homing [33] Hamper the normal functioning of cluster heads The node replication [38,39] Add extra node to the network with the same cryptographic secrets Neglect and greed [40] Deny transmission of legitimate packets and give higher priority to own packets HELLO flood [41] Flood with HELLO packets Unfairness [40] Unfair resource allocation on MAC protocols Wormhole [42][43][44][45] Offer less number of hops and less delay, which is fake Sybil [36,[46][47][48] A malicious node pretends to be more than one node…”
Section: Wsn Security Viewing Anglementioning
confidence: 99%
“…The specific form of this attack is the sinkhole or black hole attack with which a node might drop all messages it receives. As possible solutions to detect this type of attack, some secure routing algorithms and IDSs using different techniques have been proposed [3,34,35,37].…”
Section: Selective Forwardingmentioning
confidence: 99%
“…One of the well‐known active attacks in wireless networks is the selective forwarding attack (gray hole attack) , in which the adversary will selectively start dropping sensitive packets, after compromising a node explicitly included on the path of data flow. This attack has been studied in multiple previous works . Yu and Xiao in proposed a mechanism for detecting the selective forwarding attack in wireless sensor networks by using multihop acknowledgment (ACK) technique to launch alarms by obtaining responses from intermediate nodes.…”
Section: Related Workmentioning
confidence: 99%