Survey: Detection Schemes Against Selective Forwarding Attack
نویسندگان
چکیده
Wireless sensor network becomes increasingly popular with the development in technology. It can provide enormous amount of services for the benefit of mankind. But due to its limitations in memory and other resources it is very much prone security attacks, selective forwarding attack is one that security attacks which can affect the whole sensor network communication. The variety of defense scheme has been proposed against selective forwarding attack. In this paper we have describe some of the existing defense scheme against selective forwarding attack.
منابع مشابه
Detection of Selective Forwarding Attacks in Wireless Sensor Networks: A Survey
A Wireless Sensor Network (WSN) consists of distributed an autonomous devices that monitors both physical and environmental conditions. Sensor Networks are used for weather prediction and measuring temperature, sound, wave, vibration, pressure etc. Sensor Networks suffer from various security attacks like (i) sink hole attack, (ii) black hole attack, (iii) wormhole attack and (iv) selective for...
متن کاملDetection techniques of selective forwarding attacks in wireless sensor networks: a survey
The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack ,Sybil attack ,selective forwarding attacks etc. in this paper we will concentrate...
متن کاملPHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs
In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different r...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کامل