Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
PSFQ: a reliable transport protocol for wireless sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
ESRT: event-to-sink reliable transport in wireless sensor networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
DSN '04 Proceedings of the 2004 International Conference on Dependable Systems and Networks
Source-location privacy in energy-constrained sensor network routing
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Toward resilient security in wireless sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Time synchronization attacks in sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
CHEMAS: Identify suspect nodes in selective forwarding attacks
Journal of Parallel and Distributed Computing
OMH: suppressing selfish behavior in ad hoc networks with One More Hop
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Self-destruction procedure for mesh wireless sensor networks
SMO'09 Proceedings of the 9th WSEAS international conference on Simulation, modelling and optimization
Achieving optimal data storage position in wireless sensor networks
Computer Communications
OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
Mobile Networks and Applications
Lightweight anomaly intrusion detection in wireless sensor networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
iTrust: an integrated trust framework for wireless sensor networks
Proceedings of the 2010 ACM Symposium on Applied Computing
Intrusion detection of sinkhole attacks in wireless sensor networks
ALGOSENSORS'07 Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks
A detection method for routing attacks of wireless sensor network based on fuzzy C-means clustering
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 3
Detecting sinkhole attack and selective forwarding attack in wireless sensor networks
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
Rescuing wireless sensor networks security from science fiction
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Entropy attacks and countermeasures in wireless network coding
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A hidden Markov model based intrusion detection system for wireless sensor networks
International Journal of Critical Computer-Based Systems
Detecting intrusive activities from insiders in a wireless sensor network using game theory
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments
Hi-index | 0.01 |
Selective forwarding attacks may corrupt some missioncritical applications such as military surveillance and forest fire monitoring. In these attacks, malicious nodes behave like normal nodes in most time but selectively drop sensitive packets, such as a packet reporting the movement of the opposing forces. Such selective dropping is hard to detect. In this paper, we propose a lightweight security scheme for detecting selective forwarding attacks. The detection scheme uses a multi-hop acknowledgement technique to launch alarms by obtaining responses from intermediate nodes. This scheme is efficient and reliable in the sense that an intermediate node will report any abnormal packet loss and suspect nodes to both the base station and the source node. To the best of our knowledge, this is the first paper that presents a detailed scheme for detecting selective forwarding attacks in the environment of sensor networks. The simulation results show that even when the channel error rate is 15%, simulating very harsh radio conditions, the detection accuracy of the proposed scheme is over 95%.