Skip to main content

An Energy-Efficient Selective Forwarding Attack Detection Scheme Using Lazy Detection in Wireless Sensor Networks

  • Conference paper
  • First Online:
Ubiquitous Information Technologies and Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 214))

Abstract

In the wireless sensor networks, sensor nodes which are deployed in hostile environments can be easily compromised by attackers. The selective forwarding attacks drop a sensitive packet on the path to transmit the data through the compromised node. The existing selective forwarding attack detection scheme randomly selects some intermediate nodes along a forwarding path as checkpoint nodes which are responsible for generating acknowledgements for each received packet. The checkpoint nodes generate and transmit the acknowledgements to detect abnormal packet loss and identify suspect nodes for all packets. Therefore, the existing scheme is not suitable for the wireless sensor networks since the checkpoint nodes cause the excessive cost to detect the suspect nodes for all packets. In this paper, we propose an energy-efficient detection scheme for selective forwarding attacks in the wireless sensor networks. The proposed scheme monitors the entire networks based on the transmission time of a path for transmitting each packet. It performs a lazy detection for only the paths that have the potential to have attack nodes. By doing so, the proposed scheme can minimize the cost for detecting selective forwarding attacks. To show the superiority of our scheme, we compare it with the existing selective forwarding attack detection scheme. In the result, our scheme has the similar detection rate as the existing scheme and reduces unnecessary data transmissions by about 35.7 % over the existing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: 1st IEEE international workshop on sensor network protocols and applications, pp. 113–127 (2003)

    Google Scholar 

  2. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: A survey. IEEE Commun. Surv. Tutor. 11(2), 52–73 (2009)

    Article  Google Scholar 

  3. Xiao, B., Yu, B., Gao, C.: CHEMAS: Identify suspect nodes in selective forwarding attacks. J Parallel Distrib. Comp. 67(11), 1218–1230 (2007)

    Article  MATH  Google Scholar 

  4. Akyildiz, I.F., Su, W., Sankarasubramanism, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  5. Wang, C., Li, B., Sohraby, K., Daneshmand, M., Hu, Y.: Upstream congestion control in wireless sensor networks through cross-layer optimization. IEEE J. Sel. Areas Commun. 25(4), 786–795 (2007)

    Article  Google Scholar 

  6. Heinzelman, W.: Application-specific protocol architecture for wireless networks. In: Ph.D Dissertation, Massachusetts Institute of Technology (2000)

    Google Scholar 

  7. Tang, X., Xu, J.: Extending network lifetime for precision-constrained data aggregation in wireless sensor networks. In: 25th IEEE International Conference on Computer Communications, pp. 1–12 (2006)

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2012R1A1A2A10042015).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaesoo Yoo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Park, J., Seong, Do., Yeo, M., Lee, By., Yoo, J. (2013). An Energy-Efficient Selective Forwarding Attack Detection Scheme Using Lazy Detection in Wireless Sensor Networks. In: Han, YH., Park, DS., Jia, W., Yeo, SS. (eds) Ubiquitous Information Technologies and Applications. Lecture Notes in Electrical Engineering, vol 214. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5857-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5857-5_17

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5856-8

  • Online ISBN: 978-94-007-5857-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics