A SOLUTION TO SELECTIVE FORWARD ATTACK IN WIRELESS SENSOR NETWORK

Purpose of Study: Wireless mesh network represents a solution to provide wireless connectivity. There are some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on a selective forwarding attack. Se...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Students' Research in Technology & Management Vol. 6; no. 4; pp. 1 - 6
Main Authors Singh, Gulbir, Dubey, Om Prakash, Kumar, Gautam
Format Journal Article
LanguageEnglish
Published 03.10.2018
Online AccessGet full text

Cover

Loading…
More Information
Summary:Purpose of Study: Wireless mesh network represents a solution to provide wireless connectivity. There are some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on a selective forwarding attack. Selective Forwarding Attack is one of the many security threats in wireless sensor networks that can degrade network performance. An adversary on the transmission path selectively drops the packet. The adversary same time transfers the packet, while on a few occasions it drops the packet. It is difficult to detect this type of attack since the packet loss may be due to unreliable wireless communication. The proposed scheme is based on the trust value of each node. During data transmission, a node selects a downstream node that has the highest trust value, which is updated dynamically based on the number of packets a node has forwarded and dropped. Methodology: A comparative methodology is used in all existing schemes. We compared our scheme with the existing scheme and found that the packet loss in the proposed scheme is much less than the existing scheme. Result: We showed that our scheme essentially detects malicious nodes for each possible scenario. Regarding communication overhead, our scheme is more efficient than typical multipath schemes. Also, by utilizing an existing routing protocol which is secure against sinkhole attacks, our scheme also provides security against sinkhole attacks.
ISSN:2321-2543
2321-2543
DOI:10.18510/ijsrtm.2018.625