Impact of selective forwarding attack on AODV protocol in mobile wireless senor networks

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    wireless sensor network is the growing field of research having capacity to help the mankind with its usage in varied areas like military surveillance, medical etc. However these networks are vulnerable to certain attacks like black hole, wormhole and selective forwarding. In this paper selective forwarding attack is analyzed on varying number of attacker nodes and its impact on different performance parameters. It is concluded that the performance of the entire network is degraded with the increase in the number of malicious nodes.



  • Keywords

    WSN; Mobile WSN; Selective Forwarding Attack; AODV

  • References

      [1] Habib, “Sensor Network Security Issues at Network Layer,” in 2nd International Conference on Advance in Space Technologiees (ICAST 2008), 2008, pp. 58–63.

      [2] D. Virmani, A. Soni, S. Chandel, and M. Hemrajani, “Routing Attacks in Wireless Sensor Networks: A Survey,” arXiv Prepr. arXiv1407.3987, 2014.

      [3] T. Kavitha and D. Sridharan, “Security Vulnerabilities In Wireless Sensor Networks : A Survey,” J. Inf. Assur. Secur., vol. 5, pp. 31–44, 2010.

      [4] E. C. H. Ngai, J. Liu, and M. R. Lyu, “On the intruder detection for sinkhole attack in wireless sensor networks,” in IEEE International Conference on Communications, 2006, vol. 8, pp. 3383–3389.

      [5] J. Brown and X. Du, “Detection of selective forwarding attacks in heterogeneous sensor networks,” IEEE Int. Conf. Commun., pp. 1583–1587, 2008.

      [6] I. Krontiris, T. Dimitriou, and F. C. Freiling, “Towards Intrusion Detection in Wireless Sensor Networks,” in Proceedings of the 13th European wireless conference, 2007, pp. 1–10.

      [7] L. Sharif and M. Ahmed, “The Wormhole Routing Attack in Wireless Sensor Networks (WSN),” J. Inf. Process. Syst., vol. 6, no. 2, pp. 177–184, 2010.

      [8] S. Chen, G. Yang, and S. Chen, “A security routing mechanism against Sybil attack for wireless sensor networks,” in 2010 International Conference on Communications and Mobile Computing (CMC 2010), 2010, pp. 142–146.

      [9] H. M. Sun, C. M. Chen, and Y. C. Hsiao, “An efficient countermeasure to the selective forwarding attack in wireless sensor networks,” in IEEE Region 10 Annual International Conference, TENCON 2007, 2007, pp. 4–7.

      [10] S. Lim and L. Huie, “Hop-by-Hop cooperative detection of selective forwarding attacks in energy harvesting wireless sensor networks,” 2015 Int. Conf. Comput. Netw. Commun., pp. 315–319, 2015.

      [11] A. Liu, M. Dong, K. Ota, and J. Long, “PHACK: An efficient scheme for selective forwarding attack detection in WSNs,” Sensors, vol. 15, no. 12, pp. 30942–30963, 2015.

      [12] P. Chawla and M. Sachdeva, “Detection of Selective Forwarding (Gray Hole) Attack on LEACH in Wireless Sensor Networks,” Adv. Intell. Syst. Comput., pp. 389–398, 2017.

      [13] J. Ren, Y. Zhang, K. Zhang, and X. Shen, “Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks,” IEEE Trans. Wirel. Commun., vol. 15, no. 5, pp. 3718–3731, 2016.




Article ID: 13029
DOI: 10.14419/ijet.v7i2.4.13029

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.