An Energy-Efficient Selective Forwarding Attack Detection Scheme Using Lazy Detection in Wireless Sensor Networks
In the wireless sensor networks, sensor nodes which are deployed in hostile environments can be easily compromised by attackers. The selective forwarding attacks drop a sensitive packet on the path to transmit the data through the compromised node. The existing selective forwarding attack detection scheme randomly selects some intermediate nodes along a forwarding path as checkpoint nodes which are responsible for generating acknowledgements for each received packet. The checkpoint nodes generate and transmit the acknowledgements to detect abnormal packet loss and identify suspect nodes for all packets. Therefore, the existing scheme is not suitable for the wireless sensor networks since the checkpoint nodes cause the excessive cost to detect the suspect nodes for all packets. In this paper, we propose an energy-efficient detection scheme for selective forwarding attacks in the wireless sensor networks. The proposed scheme monitors the entire networks based on the transmission time of a path for transmitting each packet. It performs a lazy detection for only the paths that have the potential to have attack nodes. By doing so, the proposed scheme can minimize the cost for detecting selective forwarding attacks. To show the superiority of our scheme, we compare it with the existing selective forwarding attack detection scheme. In the result, our scheme has the similar detection rate as the existing scheme and reduces unnecessary data transmissions by about 35.7 % over the existing scheme.
KeywordsWireless sensor networks Selective forwarding attack Network security Routing
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2012R1A1A2A10042015).
- 1.Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: 1st IEEE international workshop on sensor network protocols and applications, pp. 113–127 (2003)Google Scholar
- 6.Heinzelman, W.: Application-specific protocol architecture for wireless networks. In: Ph.D Dissertation, Massachusetts Institute of Technology (2000)Google Scholar
- 7.Tang, X., Xu, J.: Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. In: 25th IEEE International Conference on Computer Communications, pp. 1–12 (2006)Google Scholar