Selective Forwarding Attacks Detection in WSNs
نویسندگان
چکیده
Wireless sensor networks (WSNs) contain numerous sensors. These sensors communicate with a vast number of small nodes via radio links. Therefore, WSNs have the most security attacks cause the limited cpacity of sensor nodes. The security attacks impact to many applications such as military surveillance, traffic surveillance, healthcare, environmental monitoring, and etc. Sensor networks are collecting the information that needed by smart evironments. These environments are like home, transportation system and etc. The study of Wireless Sensor Network is an active spot in computer science and engineering, which impact to community, econnmic, and industrial. The security of WSNs has been extensively investigated over the past few years. WSNs are susceptible to many types of attacks because they serve as an open network with limited resources of nodes. Furthermore, the obstacles to securing a wireless sensor network comprise the main disadvantage for all devices. The most conventional threats to the security of wireless sensor networks include eavesdropping, node compromised, interrupt, modify or inject malicious packets, compromised privacy and denial of service attacks. Networks have different applications. Thus, applications comprise several levels of monitoring, tracking, and controlling. A group of applications is employed for specific purposes. For example, in military applications, sensor nodes include monitoring, battlefield surveillance and object tracking. The battlefield monitors utilized in military operations have prompted the development of WSNs. In medical applications, sensors aid in patient diagnosis and monitoring. Therefore, most applications are deployed to monitor an area and react when a sensitive factor is recorded. Also, there are some potential applications of sensor networks such as enviromental monitoring, factory instrumentation and inventory tracking. Several types of attacks exist in the network layer of WSNs. In network layer, sensor node may acquire benefit of multi hop using simply refusing to route packets. Therefore, it could be executed frequently with the net result being that neighbor who marks a route through the malicious node at least will be unable to modify messages. There are a assortments of attacks targeting the network layer in WSNs. Attacker can attack the routing protocol by injecting the path between the source and base station. Security attacks In WSNs devided to insider attacks and outsider attacks. One of the insider attack is selective forwarding attack. In selective forwarding attack, the adversaries able to create routing loops, attract or repeal network traffic. Also, they can extend or shorten source routers, generate false messages, and attempt to drop the significant messgaes. Selective forwarding attack is hard to detect particulary when compromised nodes drop packets selectively. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also there are severe constraints on sensor nodes like reliability, energy effeciency, and scalability, which effect to the security. The significant energy constraints and deployment of sensor nodes in an unattended environment have contributed to the vulnerability of WSNs. Since the sensor nodes have limited capabilities for most of these constraints, selective forwarding attack is hard to detect in networks. In selective forwarding attack, malicious nodes work as a normal nodes however, it drops sensitive packets. In order to avoid this type of attack, we propose a new approach that makes the data transmission between sensor nodes moving safely. The approach is monitoring the transmission packets between sensor nodes. Before send the packet to the cluster, there is a node works as detector to detect the malicious nodes. Furthermore, the new approach is considering to reliability, energy efficiency, and scalability.
منابع مشابه
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, includin...
متن کاملDetection of Selective Forwarding Attacks in Wireless Sensor Networks: A Survey
A Wireless Sensor Network (WSN) consists of distributed an autonomous devices that monitors both physical and environmental conditions. Sensor Networks are used for weather prediction and measuring temperature, sound, wave, vibration, pressure etc. Sensor Networks suffer from various security attacks like (i) sink hole attack, (ii) black hole attack, (iii) wormhole attack and (iv) selective for...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملDefence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT †
Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large ho...
متن کاملIntrusion Detection Scheme against Sinkhole Attacks in Directed Diffusion Based Sensor Networks
Wireless Sensor Networks (WSNs) detect and report interesting events when they occur in the target region. These networks are vulnerable to security breach due to wireless communication and lack of infrastructure. In sinkhole attacks, an attacker attracts network traffic by forging or replaying routing messages through compromised nodes. Thus attracted traffic is used for selective forwarding, ...
متن کامل