A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks

It is very difficult to distinguish between selective forwarding attacks and normal packet drops in wireless sensor networks. In order to detect selective forwarding attack effectively, we propose the sequential mesh test based detection scheme in this paper. The cluster head node detects the packet drop nodes based on the sequential mesh test method after receiving the packet drop reports. This scheme extracts a small quantity of samples to run the test, instead of regulating the total times of test in advance. It decides whether continue the test or not based on the test result until it obtains the final conclusion. We show through experiments that our scheme can provide a higher detection accurate rate and a lower false alarm rate than the existing detection scheme. Meanwhile, it requires less communication and computation power and shorter detection time to detect the selective forwarding attack nodes.

[1]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Xiaojiang Du,et al.  Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[4]  Li Yan The Sequential Mesh Test for A Proportion , 2006 .

[5]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[6]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[7]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[8]  Jingsha He,et al.  Group-based intrusion detection system in wireless sensor networks , 2008, Comput. Commun..

[9]  Cristina Nita-Rotaru,et al.  JANUS: towards robust and malicious resilient routing in hybrid wireless networks , 2004, WiSe '04.

[10]  Deborah Estrin,et al.  Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .

[11]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[12]  Azer Bestavros,et al.  M2RC: multiplicative-increase/additive-decrease multipath routing control for wireless sensor networks , 2005, SIGBED.

[13]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[14]  Hung-Min Sun,et al.  An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[15]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.