Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks

In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limi...

Full description

Bibliographic Details
Main Authors: Abdelouahid Derhab, Abdelghani Bouras, Mohamed Belaoued, Leandros Maglaras, Farrukh Aslam Khan
Format: Article
Language:English
Published: MDPI AG 2020-10-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/21/6106
_version_ 1797549688303386624
author Abdelouahid Derhab
Abdelghani Bouras
Mohamed Belaoued
Leandros Maglaras
Farrukh Aslam Khan
author_facet Abdelouahid Derhab
Abdelghani Bouras
Mohamed Belaoued
Leandros Maglaras
Farrukh Aslam Khan
author_sort Abdelouahid Derhab
collection DOAJ
description In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness.
first_indexed 2024-03-10T15:18:57Z
format Article
id doaj.art-953b1daac9a7427bb2d6cdf38918a812
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-03-10T15:18:57Z
publishDate 2020-10-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-953b1daac9a7427bb2d6cdf38918a8122023-11-20T18:42:14ZengMDPI AGSensors1424-82202020-10-012021610610.3390/s20216106Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor NetworksAbdelouahid Derhab0Abdelghani Bouras1Mohamed Belaoued2Leandros Maglaras3Farrukh Aslam Khan4Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 11451, Saudi ArabiaDepartment of Industrial Engineering, College of Engineering, Alfaisal University, Riyadh 11533, Saudi ArabiaLICUS Laboratory, Department of Computer Science, University of 20 August 1955, Skikda 21000, AlgeriaSchool of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UKCenter of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 11451, Saudi ArabiaIn this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness.https://www.mdpi.com/1424-8220/20/21/6106intrusion detection systemwireless sensor networkselective routing attacktwo-hop monitoringrelaxed flow conservation constraint
spellingShingle Abdelouahid Derhab
Abdelghani Bouras
Mohamed Belaoued
Leandros Maglaras
Farrukh Aslam Khan
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
Sensors
intrusion detection system
wireless sensor network
selective routing attack
two-hop monitoring
relaxed flow conservation constraint
title Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_full Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_fullStr Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_full_unstemmed Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_short Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks
title_sort two hop monitoring mechanism based on relaxed flow conservation constraints against selective routing attacks in wireless sensor networks
topic intrusion detection system
wireless sensor network
selective routing attack
two-hop monitoring
relaxed flow conservation constraint
url https://www.mdpi.com/1424-8220/20/21/6106
work_keys_str_mv AT abdelouahidderhab twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT abdelghanibouras twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT mohamedbelaoued twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT leandrosmaglaras twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks
AT farrukhaslamkhan twohopmonitoringmechanismbasedonrelaxedflowconservationconstraintsagainstselectiveroutingattacksinwirelesssensornetworks