A Security Mechanism for Cluster-Based WSN against Selective Forwarding
A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2016-09-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/16/9/1537 |
_version_ | 1811305599491637248 |
---|---|
author | Hai Zhou Yuanming Wu Li Feng Daolei Liu |
author_facet | Hai Zhou Yuanming Wu Li Feng Daolei Liu |
author_sort | Hai Zhou |
collection | DOAJ |
description | A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy). |
first_indexed | 2024-04-13T08:28:18Z |
format | Article |
id | doaj.art-b49eff34a85b4f3aa3d20707ab6de72a |
institution | Directory Open Access Journal |
issn | 1424-8220 |
language | English |
last_indexed | 2024-04-13T08:28:18Z |
publishDate | 2016-09-01 |
publisher | MDPI AG |
record_format | Article |
series | Sensors |
spelling | doaj.art-b49eff34a85b4f3aa3d20707ab6de72a2022-12-22T02:54:21ZengMDPI AGSensors1424-82202016-09-01169153710.3390/s16091537s16091537A Security Mechanism for Cluster-Based WSN against Selective ForwardingHai Zhou0Yuanming Wu1Li Feng2Daolei Liu3School of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaSchool of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaSchool of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaSchool of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaA wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy).http://www.mdpi.com/1424-8220/16/9/1537selective-forwardinginspector nodereputation valueIDScluster-based WSN |
spellingShingle | Hai Zhou Yuanming Wu Li Feng Daolei Liu A Security Mechanism for Cluster-Based WSN against Selective Forwarding Sensors selective-forwarding inspector node reputation value IDS cluster-based WSN |
title | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_full | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_fullStr | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_full_unstemmed | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_short | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_sort | security mechanism for cluster based wsn against selective forwarding |
topic | selective-forwarding inspector node reputation value IDS cluster-based WSN |
url | http://www.mdpi.com/1424-8220/16/9/1537 |
work_keys_str_mv | AT haizhou asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT yuanmingwu asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT lifeng asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT daoleiliu asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT haizhou securitymechanismforclusterbasedwsnagainstselectiveforwarding AT yuanmingwu securitymechanismforclusterbasedwsnagainstselectiveforwarding AT lifeng securitymechanismforclusterbasedwsnagainstselectiveforwarding AT daoleiliu securitymechanismforclusterbasedwsnagainstselectiveforwarding |