A Light-Weight Countermeasure to Forwarding Misbehavior in Wireless Sensor Networks: Design, Analysis, and Evaluation

被引:47
作者
Pu, Cong [1 ]
Lim, Sunho [1 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, T WISTOR TTU Wireless Mobile Networking Lab 2, Lubbock, TX 79409 USA
来源
IEEE SYSTEMS JOURNAL | 2018年 / 12卷 / 01期
关键词
Checkpoint; based detection; denial of service (DoS); forwarding misbehavior; selective forwarding attack; wireless sensor networks (WSNs); ATTACKS; SERVICE; NODES; WMNS;
D O I
10.1109/JSYST.2016.2535730
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the lack of centralized coordination, physical protection, and security requirements of inherent network protocols, wireless sensor networks (WSNs) are vulnerable to diverse denial-of-service (DoS) attacks that primarily target service availability by disrupting network routing protocols or interfering with on-going communications. In this paper, we propose a light-weight countermeasure to a selective forwarding attack, called SCAD, where a randomly selected single checkpoint node is deployed to detect the forwarding misbehavior of malicious node. The proposed countermeasure is integrated with timeout and hop-by-hop retransmission techniques to quickly recover unexpected packet losses due to the forwarding misbehavior or bad channel quality. We also present a simple analytical model and its numerical result in terms of false detection rate. We conduct extensive simulation experiments for performance evaluation and comparison with the existing CHEMAS and CAD schemes. The simulation results show that the proposed countermeasure can improve the detection rate and packet delivery ratio (PDR) as well as reduce the energy consumption, false detection rate, and successful drop rate.
引用
收藏
页码:834 / 842
页数:9
相关论文
共 24 条
[1]  
[Anonymous], 2006, P IEEE INFOCOM
[2]  
[Anonymous], 2013, Cryptography and Network Security: Principles and Practice
[3]  
Boulis A., 2014, CASTALIA
[4]   Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach [J].
Chang, Jian-Ming ;
Tsou, Po-Chun ;
Woungang, Isaac ;
Chao, Han-Chieh ;
Lai, Chin-Feng .
IEEE SYSTEMS JOURNAL, 2015, 9 (01) :65-75
[5]   INSENS: Intrusion-tolerant routing for wireless sensor networks [J].
Deng, J ;
Han, R ;
Mishra, S .
COMPUTER COMMUNICATIONS, 2006, 29 (02) :216-230
[6]   Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges [J].
Djahel, Soufiene ;
Nait-Abdesselam, Farid ;
Zhang, Zonghua .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :658-672
[7]   Locating and bypassing holes in sensor networks [J].
Fang, Qing ;
Gao, Jie ;
Guibas, Leonidas J. .
MOBILE NETWORKS & APPLICATIONS, 2006, 11 (02) :187-200
[8]  
Intanagonwiwat C., 2000, P ACM MOBICOM, P264
[9]  
Karp B., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P243, DOI 10.1145/345910.345953
[10]   Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure [J].
Khalil, Issa ;
Bagchi, Saurabh .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (08) :1096-1112