2021
DOI: 10.1109/access.2021.3083105
|View full text |Cite
|
Sign up to set email alerts
|

Employ DBSCAN and Neighbor Voting to Screen Selective Forwarding Attack Under Variable Environment in Event-Driven Wireless Sensor Networks

Abstract: In the event-driven wireless sensor networks (EWSNs), the event of interests occurs irregularly and at random in the network. Then, sensor nodes near the event sense the event and send out data packets of the event. Next, router nodes (RNs) forward those packets to the sink node (SN) by multi-hop communications. Compromised RNs would become malicious and launch selective forwarding attacks by dropping part of or all the packets from other nodes. On the other hand, a harsh environment makes the channel poor, so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(5 citation statements)
references
References 53 publications
0
5
0
Order By: Relevance
“…Li et al (2023) [17] proposed a DBSCAN-based approach for detecting DDoS attacks in software-defined networking (SDN) environments. They used network traffic features, such as packet size, interarrival time, and packet rate, as inputs to the DBSCAN algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Li et al (2023) [17] proposed a DBSCAN-based approach for detecting DDoS attacks in software-defined networking (SDN) environments. They used network traffic features, such as packet size, interarrival time, and packet rate, as inputs to the DBSCAN algorithm.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, as the channel quality changes, the detecting capacity declines. A reputation model-based solution to identifying attacks [12] builds a reputation framework and verifies incursions using reputation values. Additionally, in order to resist selective forwarding attacks, authors incorporated the reputation, greatly increasing the PDR.…”
Section: Related Workmentioning
confidence: 99%
“…As the event of interest occurs and a new round begins, and the event node driven by EoI establishes the route. ENs establishes the route according to the voting method of neighbor nodes represented by [13], and looks for a reliable node closer to SN as the next hop node. When the network runs to the k-th round, malicious node detection begins, and k is called the detection period.…”
Section: Data Setmentioning
confidence: 99%