Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks

In wireless sensor networks, an adversary can use compromised nodes or outside jammer to launch selective forwarding attacks in which malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any more. Multipath routing can be used to counter selective forwarding attacks. However, communication overheads in multipath routing increase dramatically as the number of paths increases. In this paper, we propose a fuzzy-based reliable data delivery method to counter selective forwarding attacks. The number of paths for data delivery is determined by a fuzzy logic with consideration of the energy level of the network and the number of malicious nodes. The proposed method uses the propagation limiting method as a means for routing if multipath routing is insufficient for reliable data delivery.

[1]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[2]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[3]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[4]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[5]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[6]  Jessica Staddon,et al.  Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.

[7]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[8]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[9]  Tae Ho Cho,et al.  Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks , 2006, ICCSA.

[10]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[11]  Paul J. M. Havinga,et al.  Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[12]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[13]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..