A Security Mechanism for Cluster-Based WSN against Selective Forwarding

A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared...

Full description

Bibliographic Details
Main Authors: Hai Zhou, Yuanming Wu, Li Feng, Daolei Liu
Format: Article
Language:English
Published: MDPI AG 2016-09-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/16/9/1537
_version_ 1811305599491637248
author Hai Zhou
Yuanming Wu
Li Feng
Daolei Liu
author_facet Hai Zhou
Yuanming Wu
Li Feng
Daolei Liu
author_sort Hai Zhou
collection DOAJ
description A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy).
first_indexed 2024-04-13T08:28:18Z
format Article
id doaj.art-b49eff34a85b4f3aa3d20707ab6de72a
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-13T08:28:18Z
publishDate 2016-09-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-b49eff34a85b4f3aa3d20707ab6de72a2022-12-22T02:54:21ZengMDPI AGSensors1424-82202016-09-01169153710.3390/s16091537s16091537A Security Mechanism for Cluster-Based WSN against Selective ForwardingHai Zhou0Yuanming Wu1Li Feng2Daolei Liu3School of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaSchool of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaSchool of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaSchool of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, ChinaA wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy).http://www.mdpi.com/1424-8220/16/9/1537selective-forwardinginspector nodereputation valueIDScluster-based WSN
spellingShingle Hai Zhou
Yuanming Wu
Li Feng
Daolei Liu
A Security Mechanism for Cluster-Based WSN against Selective Forwarding
Sensors
selective-forwarding
inspector node
reputation value
IDS
cluster-based WSN
title A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_full A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_fullStr A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_full_unstemmed A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_short A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_sort security mechanism for cluster based wsn against selective forwarding
topic selective-forwarding
inspector node
reputation value
IDS
cluster-based WSN
url http://www.mdpi.com/1424-8220/16/9/1537
work_keys_str_mv AT haizhou asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT yuanmingwu asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT lifeng asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT daoleiliu asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT haizhou securitymechanismforclusterbasedwsnagainstselectiveforwarding
AT yuanmingwu securitymechanismforclusterbasedwsnagainstselectiveforwarding
AT lifeng securitymechanismforclusterbasedwsnagainstselectiveforwarding
AT daoleiliu securitymechanismforclusterbasedwsnagainstselectiveforwarding