PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes.

[1]  Anfeng Liu,et al.  Lifetime maximization through dynamic ring-based routing scheme for correlated data collecting in WSNs , 2015, Comput. Electr. Eng..

[2]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jin Myoung Kim,et al.  Improved message communication scheme in selective forwarding attack detection method , 2011, The 7th International Conference on Digital Content, Multimedia Technology and its Applications.

[4]  Minyi Guo,et al.  Mobile Target Detection in Wireless Sensor Networks With Adjustable Sensing Frequency , 2016, IEEE Systems Journal.

[5]  Minyi Guo,et al.  Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[6]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[7]  Jiming Chen,et al.  Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).

[8]  Tao Wang,et al.  QoE-ensured price competition model for emerging mobile networks , 2015, IEEE Wireless Communications.

[9]  Yuxin Liu,et al.  Analysis and Improvement of Send-and-Wait Automatic Repeat-reQuest Protocols for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..

[10]  Anfeng Liu,et al.  An Efficient Heuristic Subtraction Deployment Strategy to Guarantee Quality of Event Detection for WSNs , 2015, Comput. J..

[11]  Anfeng Liu,et al.  A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs , 2015 .

[12]  Yang Xiang,et al.  Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2011 .

[13]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[14]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[15]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[16]  Jiming Chen,et al.  Mobility and Intruder Prior Information Improving the Barrier Coverage of Sparse Sensor Networks , 2014, IEEE Transactions on Mobile Computing.

[17]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[18]  Mianxiong Dong,et al.  An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing , 2015, J. Parallel Distributed Comput..

[19]  Hung-Min Sun,et al.  An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[20]  Jiming Chen,et al.  Curve-Based Deployment for Barrier Coverage in Wireless Sensor Networks , 2014, IEEE Transactions on Wireless Communications.