An Energy-Efficient Selective Forwarding Attack Detection Scheme Using Lazy Detection in Wireless Sensor Networks

  • Junho Park
  • Dong-ook Seong
  • Myungho Yeo
  • Byung-yup Lee
  • Jaesoo Yoo
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 214)


In the wireless sensor networks, sensor nodes which are deployed in hostile environments can be easily compromised by attackers. The selective forwarding attacks drop a sensitive packet on the path to transmit the data through the compromised node. The existing selective forwarding attack detection scheme randomly selects some intermediate nodes along a forwarding path as checkpoint nodes which are responsible for generating acknowledgements for each received packet. The checkpoint nodes generate and transmit the acknowledgements to detect abnormal packet loss and identify suspect nodes for all packets. Therefore, the existing scheme is not suitable for the wireless sensor networks since the checkpoint nodes cause the excessive cost to detect the suspect nodes for all packets. In this paper, we propose an energy-efficient detection scheme for selective forwarding attacks in the wireless sensor networks. The proposed scheme monitors the entire networks based on the transmission time of a path for transmitting each packet. It performs a lazy detection for only the paths that have the potential to have attack nodes. By doing so, the proposed scheme can minimize the cost for detecting selective forwarding attacks. To show the superiority of our scheme, we compare it with the existing selective forwarding attack detection scheme. In the result, our scheme has the similar detection rate as the existing scheme and reduces unnecessary data transmissions by about 35.7 % over the existing scheme.


Wireless sensor networks Selective forwarding attack Network security Routing 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2012R1A1A2A10042015).


  1. 1.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: 1st IEEE international workshop on sensor network protocols and applications, pp. 113–127 (2003)Google Scholar
  2. 2.
    Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)CrossRefGoogle Scholar
  3. 3.
    Xiao, B., Yu, B., Gao, C.: CHEMAS: Identify suspect nodes in selective forwarding attacks. J Parallel Distrib. Comp. 67(11), 1218–1230 (2007)MATHCrossRefGoogle Scholar
  4. 4.
    Akyildiz, I.F., Su, W., Sankarasubramanism, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)CrossRefGoogle Scholar
  5. 5.
    Wang, C., Li, B., Sohraby, K., Daneshmand, M., Hu, Y.: Upstream congestion control in wireless sensor networks through cross-layer optimization. IEEE J. Sel. Areas Commun. 25(4), 786–795 (2007)CrossRefGoogle Scholar
  6. 6.
    Heinzelman, W.: Application-specific protocol architecture for wireless networks. In: Ph.D Dissertation, Massachusetts Institute of Technology (2000)Google Scholar
  7. 7.
    Tang, X., Xu, J.: Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. In: 25th IEEE International Conference on Computer Communications, pp. 1–12 (2006)Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Junho Park
    • 1
  • Dong-ook Seong
    • 2
  • Myungho Yeo
    • 3
  • Byung-yup Lee
    • 4
  • Jaesoo Yoo
    • 1
  1. 1.School of Information and Communcation EngineeringChungbuk National UniversityCheongjuKorea
  2. 2.BOAS Electronics IncIndustrial Technology Research ParkCheongjuKorea
  3. 3.Agency for Defense Development LaboratorySeoulKorea
  4. 4.Department of E-BusinessPaichai UniversityDaejeonKorea

Personalised recommendations