A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks

Intrusions detection is one of the major issues that worry organizations in wireless sensor networks (WSNs). Many researchers have dealt with this problem and have proposed many methods for detecting different kinds of intrusions such as selective forwarding, which is a serious attack that may obstruct communications in WSNs. However, as the applications of mobile computing, vehicular networks, and internet of things (IoT) are spreading immensely, selective forwarding detection in Mobile Wireless Sensor Networks (MWSNs) has become a key demand. This paper introduces the problem of selective forwarding in MWSNs, and discusses how available techniques for mitigation this problem in WSNs are not applicable in handling the problem in MWSNs due to sensors mobility. Therefore, the paper proposes a model that provides a global monitoring capability for tracing moving sensors and detecting malicious ones. The model leverages the infrastructure of Fog Computing to achieve this purpose. Furthermore, the paper provides a complete algorithm, a comprehensive discussion and experiments that show the correctness and importance of the proposed approach.

[1]  F. Freiling,et al.  Towards Intrusion Detection in Wireless Sensor Networks , 2007 .

[2]  Bo Li,et al.  The Intrusion Detection in Mobile Sensor Network , 2012, IEEE/ACM Transactions on Networking.

[3]  Vashek Matyas,et al.  Towards better selective forwarding and delay attacks detection in wireless sensor networks , 2016, 2016 IEEE 13th International Conference on Networking, Sensing, and Control (ICNSC).

[4]  Takahiro Hara,et al.  The new challenge: mobile multimedia sensor networks , 2011, Int. J. Multim. Intell. Secur..

[5]  Ricardo Staciarini Puttini,et al.  Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches , 2002, Wireless Information Systems.

[6]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[7]  Srdjan Capkun,et al.  Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..

[8]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[9]  Xenofon D. Koutsoukos,et al.  A Survey on Localization for Mobile Wireless Sensor Networks , 2009, MELT.

[10]  Eui-nam Huh,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[11]  Jian Ma,et al.  The hybrid mobile wireless sensor networks for data gathering , 2006, IWCMC '06.

[12]  George Kesidis,et al.  Secure routing in ad hoc networks and a related intrusion detection problem , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[13]  Jian Ma,et al.  Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[14]  Souvik Sarkar,et al.  Intelligent Intrusion Detection System in Wireless Sensor Network , 2014, FICTA.

[15]  Takahiro Hara,et al.  A survey on communication and data management issues in mobile sensor networks , 2014, Wirel. Commun. Mob. Comput..

[16]  Karl N. Levitt,et al.  A general cooperative intrusion detection architecture for MANETs , 2005, Third IEEE International Workshop on Information Assurance (IWIA'05).

[17]  Satria Mandala,et al.  A survey on MANET intrusion detection , 2008 .

[18]  Vashek Matyas,et al.  Improving Intrusion Detection Systems for Wireless Sensor Networks , 2014, ACNS.

[19]  Ratan K. Guha,et al.  Effective intrusion detection using multiple sensors in wireless ad hoc networks , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.