An efficient countermeasure to the selective forwarding attack in wireless sensor networks

The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor nodes but selectively drop sensitive packets in selective forwarding attack. The dropped packets may contain some crucial information; hence,...

Full description

Saved in:
Bibliographic Details
Published inTENCON 2007 - 2007 IEEE Region 10 Conference pp. 1 - 4
Main Authors Hung-Min Sun, Chien-Ming Chen, Ying-Chu Hsiao
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.10.2007
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor nodes but selectively drop sensitive packets in selective forwarding attack. The dropped packets may contain some crucial information; hence, the loss of some packets may destroy the entire networks. In this paper, we first describe the existing scheme for defending against this attack. We show that the existing scheme has some drawbacks. Second, we utilize a multi-dataflow topologies (MDT) scheme to defend against this attack. Using the MDT scheme for defending against this attack has several advantages. The great benefit of it is that the base station can still receive the information on time even some packets have been dropped; therefore, it is more suitable in monitor systems.
AbstractList The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor nodes but selectively drop sensitive packets in selective forwarding attack. The dropped packets may contain some crucial information; hence, the loss of some packets may destroy the entire networks. In this paper, we first describe the existing scheme for defending against this attack. We show that the existing scheme has some drawbacks. Second, we utilize a multi-dataflow topologies (MDT) scheme to defend against this attack. Using the MDT scheme for defending against this attack has several advantages. The great benefit of it is that the base station can still receive the information on time even some packets have been dropped; therefore, it is more suitable in monitor systems.
Author Hung-Min Sun
Chien-Ming Chen
Ying-Chu Hsiao
Author_xml – sequence: 1
  surname: Hung-Min Sun
  fullname: Hung-Min Sun
  organization: Nat. Tsing Hua Univ., Hsinchu
– sequence: 2
  surname: Chien-Ming Chen
  fullname: Chien-Ming Chen
  organization: Nat. Tsing Hua Univ., Hsinchu
– sequence: 3
  surname: Ying-Chu Hsiao
  fullname: Ying-Chu Hsiao
  organization: Nat. Tsing Hua Univ., Hsinchu
BookMark eNpFkM1OAjEUhatiIiBPwKYvMGNv5047syQEfxICG1ZuSKdzRyvQMW2R-PaSSHR1Ft-Xk5wzYgPfe2JsCiIHEPXDZrGar1e5FELniLKqlLpiI0CJCFJLec2GEso6K7AUN_8AcPAHUN6xSYwfQgjQCgHUkL3OPKeuc9aRT9z2R58oHMjEYyCeep7eiUfak03ui3jXh5MJrfNv3KRk7I47z08unIUYz56PfeCe0qkPu3jPbjuzjzS55JhtHheb-XO2XD-9zGfLzNUiZYSm0edRWoFuClSoUWgBDVpQtjO21EBNqyzJpjBtrQmUAQLsysqqVppizKa_tY6Itp_BHUz43l4uKn4AJhRaQA
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/TENCON.2007.4428866
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 1424412722
9781424412723
EISSN 2159-3450
EndPage 4
ExternalDocumentID 4428866
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IH
6IK
6IL
6IM
6IN
AAJGR
AARBI
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i90t-e4ab70077617b3464740701b4c16cfac571ebd6ce2b3ad97e16a1e14f58c6d2a3
IEDL.DBID RIE
ISBN 1424412714
9781424412716
ISSN 2159-3442
IngestDate Wed Jun 26 19:23:46 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-e4ab70077617b3464740701b4c16cfac571ebd6ce2b3ad97e16a1e14f58c6d2a3
PageCount 4
ParticipantIDs ieee_primary_4428866
PublicationCentury 2000
PublicationDate 2007-Oct.
PublicationDateYYYYMMDD 2007-10-01
PublicationDate_xml – month: 10
  year: 2007
  text: 2007-Oct.
PublicationDecade 2000
PublicationTitle TENCON 2007 - 2007 IEEE Region 10 Conference
PublicationTitleAbbrev TENCON
PublicationYear 2007
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001764116
ssj0000602087
Score 1.5187017
Snippet The selective forwarding attack is a serious threat in wireless sensor networks, especially in monitor systems. Malicious sensor nodes work like normal sensor...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Base stations
Computer science
Computerized monitoring
Information security
Network topology
Routing
Scalability
Sensor systems
Sun
Wireless sensor networks
Title An efficient countermeasure to the selective forwarding attack in wireless sensor networks
URI https://ieeexplore.ieee.org/document/4428866
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6AkydUMP5ODx4drKxr6dEYCDGBeMCEeCFt95oQzGZgXPzrfe0GROPB27Zs3dZt78e3976PkAfDvJfQNkqNEhF33EXGGR7ho3YG_aUVAbqYzsTkjb8s0kWDPB56YQAgFJ9Bzy-Gf_lZYXceKutzjJWHQjRJUypV9Wod8JRYeLlJecRXpOAsKJ-iU1NRwkPWHvq62EAyvqd7qtdFzUjEYtWfjzCfnlX0hvUpf2ivBNczbpPp_qKripN1b1eanv36xef437s6Jd1jkx99PbivM9KA_Jy09yoPtP7oO-T9KacQiCZwGBq0JdCaV9AiLQuKESTdBjUdNJwUY2Bfh4sjUl2W2q7pKqeeD_kDTSrul2-LDc2r2vNtl8zHo_nzJKoVGaKVissIuDYyEAAxaRIuuMR0MGaGWyas0zaVDEzmNcZMojMlgQnNgHGXDq3IBjq5IK28yOGS0EzwoQPGnKeXx-O1lE6CYNmAZ6BBXZGOn6nlZ8W5sawn6frvzTfkJGCuocjulrTKzQ7uMFgozX14S74BY9y40w
link.rule.ids 310,311,783,787,792,793,799,27937,55086
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG4QD3pCBeNve_BogbKu3Y7GQFCBeJgJ8ULark0IZjMwLv71vnYDovHgbVu2buu29-Pbe9-H0J2izktITUIVc8Iss0RZxQg8aqvAX2ruoYvxhA_f2PM0nNbQ_bYXxhjji89M2y36f_lprtcOKuswiJUjzvfQPsTVES-7tbaISpc7wUmxQ1gEZ9Rrn4Jbi0nAfN7uO7toT1C2IXyq1nnFSUS7cSfpQ0Y9KQkOq5P-UF_xzmfQQOPNZZc1J4v2ulBt_fWL0fG_93WEWrs2P_y6dWDHqGayE9TY6Dzg6rNvoveHDBtPNQHDYK8uAfa8BBdxkWOIIfHK6-mA6cQQBbtKXBgRy6KQeoHnGXaMyB9gVGG_bJUvcVZWn69aKBn0k8chqTQZyDzuFsQwqYSnAKJCBYwzAQlhlyqmKddW6lBQo1KnMqYCmcbCUC6pocyGkeZpTwanqJ7lmTlDOOUssoZS6wjm4XgphBWG07THUiNNfI6abqZmnyXrxqyapIu_N9-ig2EyHs1GT5OXS3ToEVhfcneF6sVyba4hdCjUjX9jvgFAe7we
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=TENCON+2007+-+2007+IEEE+Region+10+Conference&rft.atitle=An+efficient+countermeasure+to+the+selective+forwarding+attack+in+wireless+sensor+networks&rft.au=Hung-Min+Sun&rft.au=Chien-Ming+Chen&rft.au=Ying-Chu+Hsiao&rft.date=2007-10-01&rft.pub=IEEE&rft.isbn=9781424412716&rft.issn=2159-3442&rft.eissn=2159-3450&rft.spage=1&rft.epage=4&rft_id=info:doi/10.1109%2FTENCON.2007.4428866&rft.externalDocID=4428866
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2159-3442&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2159-3442&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2159-3442&client=summon