Abstract
In the wireless sensor networks, sensor nodes which are deployed in hostile environments can be easily compromised by attackers. The selective forwarding attacks drop a sensitive packet on the path to transmit the data through the compromised node. The existing selective forwarding attack detection scheme randomly selects some intermediate nodes along a forwarding path as checkpoint nodes which are responsible for generating acknowledgements for each received packet. The checkpoint nodes generate and transmit the acknowledgements to detect abnormal packet loss and identify suspect nodes for all packets. Therefore, the existing scheme is not suitable for the wireless sensor networks since the checkpoint nodes cause the excessive cost to detect the suspect nodes for all packets. In this paper, we propose an energy-efficient detection scheme for selective forwarding attacks in the wireless sensor networks. The proposed scheme monitors the entire networks based on the transmission time of a path for transmitting each packet. It performs a lazy detection for only the paths that have the potential to have attack nodes. By doing so, the proposed scheme can minimize the cost for detecting selective forwarding attacks. To show the superiority of our scheme, we compare it with the existing selective forwarding attack detection scheme. In the result, our scheme has the similar detection rate as the existing scheme and reduces unnecessary data transmissions by about 35.7 % over the existing scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: 1st IEEE international workshop on sensor network protocols and applications, pp. 113–127 (2003)
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)
Xiao, B., Yu, B., Gao, C.: CHEMAS: Identify suspect nodes in selective forwarding attacks. J Parallel Distrib. Comp. 67(11), 1218–1230 (2007)
Akyildiz, I.F., Su, W., Sankarasubramanism, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Wang, C., Li, B., Sohraby, K., Daneshmand, M., Hu, Y.: Upstream congestion control in wireless sensor networks through cross-layer optimization. IEEE J. Sel. Areas Commun. 25(4), 786–795 (2007)
Heinzelman, W.: Application-specific protocol architecture for wireless networks. In: Ph.D Dissertation, Massachusetts Institute of Technology (2000)
Tang, X., Xu, J.: Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. In: 25th IEEE International Conference on Computer Communications, pp. 1–12 (2006)
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2012R1A1A2A10042015).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Park, J., Seong, Do., Yeo, M., Lee, By., Yoo, J. (2013). An Energy-Efficient Selective Forwarding Attack Detection Scheme Using Lazy Detection in Wireless Sensor Networks. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_17
Download citation
DOI: https://doi.org/10.1007/978-94-007-5857-5_17
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-5856-8
Online ISBN: 978-94-007-5857-5
eBook Packages: EngineeringEngineering (R0)