Security against Selective Forward Attack in Wireless Sensor Network

Wireless sensor networks (WSNs) are being increasingly deployed for various applications such as object tracking and monitoring, precision agriculture, controlling nuclear reactors, detecting seismic activities, security and surveillance, navigational activities, industrial automation, and so on. In selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any more. In this paper we have proposed a defensive technique. Our approach is divided into mainly three phases: In first phase the node discover a path and its neighbor nodes, in second phase when the event is generated and data is propagated in multipath and is checked whether the data reached is correct or not, and in the final phase if any error is detected then a MONITOR packet is generated and the malicious node is removed.

[1]  P. Pandarinath Secure localization with defense against selective forwarding attacks in wireless sensor networks , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[2]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[3]  Jie Wu,et al.  A Survey on Secure Localization in Wireless Sensor Networks , 2007 .

[4]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[5]  Jerry Zhao,et al.  Habitat monitoring: application driver for wireless communications technology , 2001, CCRV.

[6]  Xenofon D. Koutsoukos,et al.  A Survey on Localization for Mobile Wireless Sensor Networks , 2009, MELT.

[7]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[8]  Edoardo S. Biagioni,et al.  The Application of Remote Sensor Technology To Assist the Recovery of Rare and Endangered Species , 2002, Int. J. High Perform. Comput. Appl..

[9]  Sisi Liu,et al.  Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes , 2010, IEEE Trans. Mob. Comput..

[10]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.