Abstract
Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.
Similar content being viewed by others
Abbreviations
- r 0 :
-
Radius of the cluster
- R 0 :
-
Transmission range of the network
- CRV :
-
Composite reputation range
- CH :
-
Cluster head
- IN :
-
Inspector node
- MN :
-
Member node
- node id :
-
Identity of any node
- a :
-
Constant
- Pr id :
-
Forwarding rate
- b :
-
Constant
- E else :
-
Surplus energy of the node
- E 0 :
-
Initial energy level of the node
References
Gill, R. K., Chawla, P., & Sachdeva, M. (2016). Wireless sensor network: Threat models and security issues.
Sundararaj, V., Muthukumar, S., & Kumar, R. S. (2018). An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Computers and Security, 77, 277–288.
Sundararaj, V. (2016). An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. The International Journal of Intelligent Engineering and Systems, 9(3), 117–126.
Vinu, S. (2019). Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wireless Personal Communications, 104(1), 173–197.
Sundararaj, V. (2019). Optimised denoising scheme via opposition-based self-adaptive learning PSO algorithm for wavelet-based ECG signal noise reduction. International Journal of Biomedical Engineering and Technology, 31(4), 325.
Sundararaj, V., Anoop, V., Dixit, P., Arjaria, A., Chourasia, U., Bhambri, P., et al. (2020). CCGPA-MPPT: Cauchy preferential crossover-based global pollination algorithm for MPPT in photovoltaic system. Progress in Photovoltaics: Research and Applications, 28(11), 1128–1145.
Rose, S. H., & Jayasree, T. (2019). Detection of jamming attack using timestamp for WSN. Ad Hoc Networks, 91, 101874.
Zhou, H., Shen, S., & Liu, J. (2020). Malware propagation model in wireless sensor networks under attack–defense confrontation. Computer Communications, 162, 51–58.
Tournier, J., Lesueur, F., Le Mouël, F., Guyon, L., & Ben-Hassine, H. (2020). A survey of IoT protocols and their security issues through the lens of a generic IoT stack. Internet of Things, 9, 100264.
Bhushan, B., & Sahoo, G. (2020). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communications, 111(3), 1667–1694.
Udhayavani, M., & Chandrasekaran, M. (2018). Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks. Berlin: Springer.
Krontiris, I., Giannetsos, T., & Dimitriou, T. (2008). Launching a sinkhole attack in wireless sensor networks; the intruder side. In Proceedings of IEEE international conference wireless and mobile computing, networking and communication (WIMOB ’08) (pp. 526–531).
Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The Sybil attack in sensor networks: Analysis and defences. In Proceedings third international conference information processing in sensor networks (IPSN ’04) (2004).
Bai, L., Ferrese, F., Ploskina, K., & Biswas, S. (2009). Performance analysis of mobile agent-based wireless sensor network. In Proceeding eighth international conference reliability, maintainability and safety (ICRMS ’09) (pp. 16–19).
Zhang, L., Wang, Q., & Shu, X. (2009). A mobile-agent-based middleware for wireless sensor networks data fusion. In Proceeding instrumentation and measurement technology conference (I2MTC ’09) (pp. 378–383).
Xue, W., Aiguo, J., & Sheng, W. (2005). Mobile agent based moving target methods in wireless sensor networks. In Proceedings IEEE international symposium communication and information technology (ISCIT ’05) (vol. 1, pp. 22–26).
Jeong, H.-J., Nam, C.-S., Jeong, Y.-S., & Shin, D.-R. (2008). A mobile agent based leach in wireless sensor networks. In Proceedings 10th international conference advanced communication technology (ICACT ’08) (vol. 1, pp. 75–78).
Al-Karaki, J., & Kamal, A. (2004). Routing techniques in wireless sensor networks: A survey. Wireless Communications, 11(6), 6–28.
Karlof, C., Sastry, N., Wagner, D. (2004). Tinysec: A link layer security architecture for wireless sensor networks. In Proceeding ACM international conference embedded networked sensor systems (SenSys’ 04).
Perrig, A., Szewczyk, R., Wen, W., Culler, D., & Tygar, J. (2002). SPINS: Security protocols for sensor networks. Wireless Networks Journal, 8(5), 521–534.
Watro, R., Kong, D., Cuti, S., Gardiner, C., Lynn, C., & Kruus, P. (2004). Tinypk: Securing sensor networks with public key technology. In Proceedings second ACM workshop security of ad hoc and sensor networks (SASN ’04) (pp. 59–64).
Liu, A., & Ning, P. (2008). Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proceedings seventh international conference information processing in sensor networks (IPSN ’08) (pp. 245–256).
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures in Ad Hoc. Networks, 1(2), 293–315.
Wood, A., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer, 35(10), 54–62.
Lee, S. B., & Choi, Y. H. (2006). A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks. In Proceedings of the fourth ACM workshop on security of ad hoc and sensor networks (SASN’06) (pp. 59–70).
Liu, Y., Dong, M., Ota, K., & Liu, A. (2016). Active trust: Secure and trustable routing in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 11(9), 2013–2027.
Semanti, D., & Abhijit, D. (2015). An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol. In Proceedings of the 2015 international conference on advances in computer engineering and applications, Ghaziabad, India (pp. 19–20).
Das, S., Barani, S., Wagh, S., & Sonavane, S.S. (2016). Energy efficient and trustable routing protocol for wireless sensor networks based on genetic algorithm (E2TRP). In Proceedings in IEEE international conference on automatic control and dynamic optimization techniques (ICACDOT), Pune, India (pp. 154–159).
Sharmila, S., & Umamaheswari, G. (2011). Detection of sinkhole attack in wireless sensor networks using message digest algorithms. In Proceedings in 2011 international conference on process automation, control and computing, coimbatore, India (pp. 1–6).
Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings in the first IEEE international workshop on sensor network protocols and applications, Anchorage, AK, USA (pp. 113–127).
Alajmi, N. M., & Elleithy, K. (2016). A new approach for detecting and monitoring of selective forwarding attack in wireless sensor networks. In Proceedings in 2016 IEEE long island systems, applications and technology conference (LISAT), Farmingdale, NY, USA (pp. 1–6).
Geethu, P. C., & Mohammed, A. R. (2013). Defense mechanism against selective forwarding attack in wire-less sensor networks. In Proceedings in 2013 fourth international conference on computing, communications and networking technologies (ICCCNT), Tiruchengode, India (pp. 1–4).
Motamedi, M., & Yazdani, N. (2015). Detection of black hole attack in wireless sensor network using uav. In Proceedings in 2015 7th conference on information and knowledge technology (IKT), Urmia, Iran (pp. 1–5).
Latha, D., & Palanivel, K. (2014). Secure routing through trusted nodes in wireless sensor networks a survey. International Journal of Advanced Research in Computer Engineering and Technology, 3(11), 3792–3799.
Mezrag, F., Salim, B., & Mellouk, A. (2017). Secure routing in cluster-based wireless sensor networks. In GLOBECOM 2017–2017 IEEE global communications conference. IEEE.
Jeba, S. V. A., & Suresh Kumar, R. (2015). Reliable anonymous secure packet forwarding scheme for wireless sensor networks. Computers and Electrical Engineering, 48, 405–416.
Sundararajan, R. K., & Arumugam, U. (2015). Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor networks. Journal of Sensors.
Chawla, P., & Sachdeva, M. (2018). Detection of selective forwarding (gray hole) attack on LEACH in wireless sensor networks. In Next-generation networks, advances in intelligent systems and computing. Springer Nature Singapore Pte Ltd. (pp. 389–398).
Acknowledgement
The authors of this paper acknowledge the IK Gujral Punjab Technical University, Kapurthala.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, S., Saini, H.S. Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN. Wireless Pers Commun 118, 789–814 (2021). https://doi.org/10.1007/s11277-020-08044-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-020-08044-0