An efficient countermeasure to the selective forwarding attack in wireless sensor networks
The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor nodes but selectively drop sensitive packets in selective forwarding attack. The dropped packets may contain some crucial information; hence,...
Saved in:
Published in | TENCON 2007 - 2007 IEEE Region 10 Conference pp. 1 - 4 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2007
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor nodes but selectively drop sensitive packets in selective forwarding attack. The dropped packets may contain some crucial information; hence, the loss of some packets may destroy the entire networks. In this paper, we first describe the existing scheme for defending against this attack. We show that the existing scheme has some drawbacks. Second, we utilize a multi-dataflow topologies (MDT) scheme to defend against this attack. Using the MDT scheme for defending against this attack has several advantages. The great benefit of it is that the base station can still receive the information on time even some packets have been dropped; therefore, it is more suitable in monitor systems. |
---|---|
AbstractList | The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor nodes but selectively drop sensitive packets in selective forwarding attack. The dropped packets may contain some crucial information; hence, the loss of some packets may destroy the entire networks. In this paper, we first describe the existing scheme for defending against this attack. We show that the existing scheme has some drawbacks. Second, we utilize a multi-dataflow topologies (MDT) scheme to defend against this attack. Using the MDT scheme for defending against this attack has several advantages. The great benefit of it is that the base station can still receive the information on time even some packets have been dropped; therefore, it is more suitable in monitor systems. |
Author | Hung-Min Sun Chien-Ming Chen Ying-Chu Hsiao |
Author_xml | – sequence: 1 surname: Hung-Min Sun fullname: Hung-Min Sun organization: Nat. Tsing Hua Univ., Hsinchu – sequence: 2 surname: Chien-Ming Chen fullname: Chien-Ming Chen organization: Nat. Tsing Hua Univ., Hsinchu – sequence: 3 surname: Ying-Chu Hsiao fullname: Ying-Chu Hsiao organization: Nat. Tsing Hua Univ., Hsinchu |
BookMark | eNpFkM1OAjEUhatiIiBPwKYvMGNv5047syQEfxICG1ZuSKdzRyvQMW2R-PaSSHR1Ft-Xk5wzYgPfe2JsCiIHEPXDZrGar1e5FELniLKqlLpiI0CJCFJLec2GEso6K7AUN_8AcPAHUN6xSYwfQgjQCgHUkL3OPKeuc9aRT9z2R58oHMjEYyCeep7eiUfak03ui3jXh5MJrfNv3KRk7I47z08unIUYz56PfeCe0qkPu3jPbjuzjzS55JhtHheb-XO2XD-9zGfLzNUiZYSm0edRWoFuClSoUWgBDVpQtjO21EBNqyzJpjBtrQmUAQLsysqqVppizKa_tY6Itp_BHUz43l4uKn4AJhRaQA |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/TENCON.2007.4428866 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 1424412722 9781424412723 |
EISSN | 2159-3450 |
EndPage | 4 |
ExternalDocumentID | 4428866 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IG 6IH 6IK 6IL 6IM 6IN AAJGR AARBI ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i90t-e4ab70077617b3464740701b4c16cfac571ebd6ce2b3ad97e16a1e14f58c6d2a3 |
IEDL.DBID | RIE |
ISBN | 1424412714 9781424412716 |
ISSN | 2159-3442 |
IngestDate | Wed Jun 26 19:23:46 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-e4ab70077617b3464740701b4c16cfac571ebd6ce2b3ad97e16a1e14f58c6d2a3 |
PageCount | 4 |
ParticipantIDs | ieee_primary_4428866 |
PublicationCentury | 2000 |
PublicationDate | 2007-Oct. |
PublicationDateYYYYMMDD | 2007-10-01 |
PublicationDate_xml | – month: 10 year: 2007 text: 2007-Oct. |
PublicationDecade | 2000 |
PublicationTitle | TENCON 2007 - 2007 IEEE Region 10 Conference |
PublicationTitleAbbrev | TENCON |
PublicationYear | 2007 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0001764116 ssj0000602087 |
Score | 1.5187017 |
Snippet | The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Base stations Computer science Computerized monitoring Information security Network topology Routing Scalability Sensor systems Sun Wireless sensor networks |
Title | An efficient countermeasure to the selective forwarding attack in wireless sensor networks |
URI | https://ieeexplore.ieee.org/document/4428866 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6AkydUMP5ODx4drKxr6dEYCDGBeMCEeCFt95oQzGZgXPzrfe0GROPB27Zs3dZt78e3976PkAfDvJfQNkqNEhF33EXGGR7ho3YG_aUVAbqYzsTkjb8s0kWDPB56YQAgFJ9Bzy-Gf_lZYXceKutzjJWHQjRJUypV9Wod8JRYeLlJecRXpOAsKJ-iU1NRwkPWHvq62EAyvqd7qtdFzUjEYtWfjzCfnlX0hvUpf2ivBNczbpPp_qKripN1b1eanv36xef437s6Jd1jkx99PbivM9KA_Jy09yoPtP7oO-T9KacQiCZwGBq0JdCaV9AiLQuKESTdBjUdNJwUY2Bfh4sjUl2W2q7pKqeeD_kDTSrul2-LDc2r2vNtl8zHo_nzJKoVGaKVissIuDYyEAAxaRIuuMR0MGaGWyas0zaVDEzmNcZMojMlgQnNgHGXDq3IBjq5IK28yOGS0EzwoQPGnKeXx-O1lE6CYNmAZ6BBXZGOn6nlZ8W5sawn6frvzTfkJGCuocjulrTKzQ7uMFgozX14S74BY9y40w |
link.rule.ids | 310,311,783,787,792,793,799,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4QD3pCBeNve_BogbKu3Y7GQFCBeJgJ8ULark0IZjMwLv71vnYDovHgbVu2buu29-Pbe9-H0J2izktITUIVc8Iss0RZxQg8aqvAX2ruoYvxhA_f2PM0nNbQ_bYXxhjji89M2y36f_lprtcOKuswiJUjzvfQPsTVES-7tbaISpc7wUmxQ1gEZ9Rrn4Jbi0nAfN7uO7toT1C2IXyq1nnFSUS7cSfpQ0Y9KQkOq5P-UF_xzmfQQOPNZZc1J4v2ulBt_fWL0fG_93WEWrs2P_y6dWDHqGayE9TY6Dzg6rNvoveHDBtPNQHDYK8uAfa8BBdxkWOIIfHK6-mA6cQQBbtKXBgRy6KQeoHnGXaMyB9gVGG_bJUvcVZWn69aKBn0k8chqTQZyDzuFsQwqYSnAKJCBYwzAQlhlyqmKddW6lBQo1KnMqYCmcbCUC6pocyGkeZpTwanqJ7lmTlDOOUssoZS6wjm4XgphBWG07THUiNNfI6abqZmnyXrxqyapIu_N9-ig2EyHs1GT5OXS3ToEVhfcneF6sVyba4hdCjUjX9jvgFAe7we |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=TENCON+2007+-+2007+IEEE+Region+10+Conference&rft.atitle=An+efficient+countermeasure+to+the+selective+forwarding+attack+in+wireless+sensor+networks&rft.au=Hung-Min+Sun&rft.au=Chien-Ming+Chen&rft.au=Ying-Chu+Hsiao&rft.date=2007-10-01&rft.pub=IEEE&rft.isbn=9781424412716&rft.issn=2159-3442&rft.eissn=2159-3450&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FTENCON.2007.4428866&rft.externalDocID=4428866 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2159-3442&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2159-3442&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2159-3442&client=summon |