The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures

Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.

[1]  Hung-Min Sun,et al.  An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[2]  Pan Yong,et al.  A Polynomial-Based Countermeasure to Selective Forwarding Attacks in Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[3]  Yenumula B. Reddy,et al.  Game theory model for selective forward attacks in wireless sensor networks , 2009, 2009 17th Mediterranean Conference on Control and Automation.

[4]  Felix C. Freiling,et al.  Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .

[5]  Dong Hoon Lee,et al.  CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[6]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[7]  Xingming Sun,et al.  Selective forwarding attack detection using watermark in WSNs , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[8]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[9]  Xiaojiang Du,et al.  Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks , 2008, 2008 IEEE International Conference on Communications.

[10]  Yoon-Hwa Choi,et al.  A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks , 2006, SASN '06.

[11]  Xiangdong Liu,et al.  A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[12]  Tae Ho Cho,et al.  Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks , 2007, UIC.

[13]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[14]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[15]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[16]  Nidal Nasser,et al.  SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks , 2007, Comput. Commun..

[17]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[18]  Zhan Yong-zhao,et al.  Lightweight defense scheme against selective forwarding attacks in wireless sensor networks , 2009, 2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[19]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[20]  Ruttikorn Varakulsiripunth,et al.  Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[21]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[22]  Li Yan The Sequential Mesh Test for A Proportion , 2006 .

[23]  Venkata M. Mulpuru,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2008 .

[24]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.