CFP last date
22 April 2024
Reseach Article

Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks

by S. Sharmila, G. Umamaheswari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 4
Year of Publication: 2012
Authors: S. Sharmila, G. Umamaheswari
10.5120/4812-7048

S. Sharmila, G. Umamaheswari . Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks. International Journal of Computer Applications. 39, 4 ( February 2012), 46-52. DOI=10.5120/4812-7048

@article{ 10.5120/4812-7048,
author = { S. Sharmila, G. Umamaheswari },
title = { Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 4 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 46-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number4/4812-7048/ },
doi = { 10.5120/4812-7048 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:25:36.747921+05:30
%A S. Sharmila
%A G. Umamaheswari
%T Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 4
%P 46-52
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this paper, defensive mechanisms based on cumulative acknowledgement and energy based is proposed to detect selective forward attack in mobile wireless sensor networks. The proposed mechanism is simulated with Berkeley Mica 2 Motes configuration in Network Simulator Version 2 and Glomosim. The scheme is evaluated in terms of packet delivery ratio and throughput.

References
  1. A.Perrig,R.Szewczyk, V.Wen, D.culler and J.D.Tygar, “SPINS: Security protocols for Sensor Networks”, ACM Journal of Wireless Networks, pp 521-5234, September 2002.
  2. W.Lee and Y.Huang, “Intrusion Detection Techniques for Mobile Networks,” ACM wireless networks journal, September 2003.
  3. C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, Ad Hoc Networks, 1(2-3):293–315, 2003.
  4. Swades De, Chunming Qiao , Hongyi Wu, “Meshed multipath routing with selective forwarding : an efficient strategy in Wireless sensor networks , Computer Networks”, The International Journal of Computer and Telecommunications Networking, Vol 43, Issue 4, pp. 481-497, November 2003.
  5. B. Yu and B. Xiao, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks”, in the Proceedings of. 20th International Sympsium on Parallel and Distributed Processing (IPDPS 2006), pp.1-8, 2006.
  6. C.E.Loo, M.Y.Ng, C.Leckie and M Palaniswami, “Intrusion Detection for routing attacks in sensor networks”, International Journal of distributed sensor networks”,Vol.2, pp, 313-332, 2006.
  7. B. Xiao, B. Yu, and C. Gao, “CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks”, Journal of Parallel and Distributed Computing, Vol. 67, Issue 11, pp. 1218-1230, 2007.
  8. Hung-Min sun, Chien-Ming chen and Ying-Chu Hsiao, “An Efficient countermeasure to the selective forwarding attack in wireless sensor networks”,1-4244-1272-2/07/$25.002007 IEEE.
  9. Young Ki Kim, Hwaseong Lee, Kwantae Cho, and Dong Hoon Lee, “CADE:Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks”, in the Proceedings of third International Conference on Convergence and Hybrid Information Technology, 2008.
  10. Nguyen Xuan Quy and Dugki Min , Eunmi Choi, “An Energy-Efficient Data Dissemination protocol for Grid-Based Wireless Sensor Networks”, IEEE International Conference on Research, Innovation and Vision for the Future in Computing Communication Technologies, RIVF 2008, Ho Chi Minh City, Vietnam, 13-17 July 2008.
  11. Jeremy brown and Xiaojiang Du, “Detection of Selective Forward Attacks in Heterogeneous Sensor Networks”, published in the Proceedings of ICC 2008.
  12. Tran Hoang Hai and Eui nam Huh, “Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge”, in NCA, pages 325–331, 2008.
  13. Jing wu,lijia len,pu-lia yan,” New Reliable Routing Method Based on Probabilistic Forwarding in Wireless Sensor Network 2009.
  14. Tran hang hai, eui-nam huh,” Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hop neighbor Knowledge. Volume 8 - Volume8,2000.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Routing Attack Selective Forward Attack Acknowledgement based Energy Based Wireless Sensor