Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 39 - Number 4
Year of Publication: 2012
Authors:
S. Sharmila
G. Umamaheswari
10.5120/4812-7048

S Sharmila and G Umamaheswari. Article: Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks. International Journal of Computer Applications 39(4):46-52, February 2012. Full text available. BibTeX

@article{key:article,
	author = {S. Sharmila and G. Umamaheswari},
	title = {Article: Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {39},
	number = {4},
	pages = {46-52},
	month = {February},
	note = {Full text available}
}

Abstract

Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this paper, defensive mechanisms based on cumulative acknowledgement and energy based is proposed to detect selective forward attack in mobile wireless sensor networks. The proposed mechanism is simulated with Berkeley Mica 2 Motes configuration in Network Simulator Version 2 and Glomosim. The scheme is evaluated in terms of packet delivery ratio and throughput.

References

  • A.Perrig,R.Szewczyk, V.Wen, D.culler and J.D.Tygar, “SPINS: Security protocols for Sensor Networks”, ACM Journal of Wireless Networks, pp 521-5234, September 2002.
  • W.Lee and Y.Huang, “Intrusion Detection Techniques for Mobile Networks,” ACM wireless networks journal, September 2003.
  • C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, Ad Hoc Networks, 1(2-3):293–315, 2003.
  • Swades De, Chunming Qiao , Hongyi Wu, “Meshed multipath routing with selective forwarding : an efficient strategy in Wireless sensor networks , Computer Networks”, The International Journal of Computer and Telecommunications Networking, Vol 43, Issue 4, pp. 481-497, November 2003.
  • B. Yu and B. Xiao, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks”, in the Proceedings of. 20th International Sympsium on Parallel and Distributed Processing (IPDPS 2006), pp.1-8, 2006.
  • C.E.Loo, M.Y.Ng, C.Leckie and M Palaniswami, “Intrusion Detection for routing attacks in sensor networks”, International Journal of distributed sensor networks”,Vol.2, pp, 313-332, 2006.
  • B. Xiao, B. Yu, and C. Gao, “CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks”, Journal of Parallel and Distributed Computing, Vol. 67, Issue 11, pp. 1218-1230, 2007.
  • Hung-Min sun, Chien-Ming chen and Ying-Chu Hsiao, “An Efficient countermeasure to the selective forwarding attack in wireless sensor networks”,1-4244-1272-2/07/$25.002007 IEEE.
  • Young Ki Kim, Hwaseong Lee, Kwantae Cho, and Dong Hoon Lee, “CADE:Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks”, in the Proceedings of third International Conference on Convergence and Hybrid Information Technology, 2008.
  • Nguyen Xuan Quy and Dugki Min , Eunmi Choi, “An Energy-Efficient Data Dissemination protocol for Grid-Based Wireless Sensor Networks”, IEEE International Conference on Research, Innovation and Vision for the Future in Computing Communication Technologies, RIVF 2008, Ho Chi Minh City, Vietnam, 13-17 July 2008.
  • Jeremy brown and Xiaojiang Du, “Detection of Selective Forward Attacks in Heterogeneous Sensor Networks”, published in the Proceedings of ICC 2008.
  • Tran Hoang Hai and Eui nam Huh, “Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge”, in NCA, pages 325–331, 2008.
  • Jing wu,lijia len,pu-lia yan,” New Reliable Routing Method Based on Probabilistic Forwarding in Wireless Sensor Network 2009.
  • Tran hang hai, eui-nam huh,” Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hop neighbor Knowledge. Volume 8 - Volume8,2000.