Back
 WSN  Vol.4 No.8 , August 2012
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack
Abstract: Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. It is hard to defend the sensor network from the multiple attacks through existing security methods. Thus, we suggest an energy-efficient security method in order to detect the multiple attacks. This paper presents a security method to detect the false report injection attack and the selective forwarding attack in the sensor network using a new message type. The message type is a filtering message. The filtering message prevents from generating and forwarding false alert messages. We evaluated performance of our proposed method through a simulation in comparison with an application of SEF (statistical enroute filtering scheme) and CHEMAS (Check point-based Multi-hop Acknowledgement Scheme). The simulation results represent that the proposed method is 10% more energy-efficient than the application when the number of false reports is great while retaining the detection performance.
Cite this paper: H. Lee and T. Cho, "An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack," Wireless Sensor Network, Vol. 4 No. 8, 2012, pp. 185-190. doi: 10.4236/wsn.2012.48027.
References

[1]   I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE of Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422

[2]   T. F. Smith and M. S. Waterman, “Identification of Common Molecular Subsequences,” Journal of Molecular Biology, Vol. 147, No. 1, 1981, pp. 195-197. doi:10.1016/0022-2836(81)90087-5

[3]   E. C. H. Ngai, J. Liu, and M. R. Lyu, “An Efficient Intruder Detection Algorithm against Sinkhole Attacks in Wireless Sensor Networks,” Computer Communications, Vol. 30, No. 11-12, 2007, pp. 2353-2364. doi:10.1016/j.comcom.2007.04.025

[4]   F. Ye, H. Luo and S. W. Lu, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 4, 2004, pp. 2446-2457.

[5]   Z. Yu and Y. Guan, “A Dynamic En-Route Filtering Scheme for Data Reporting in Wireless Sensor Networks,” Ieee- Acm Transactions on Networking, Vol. 18, No. 1, 2010, pp. 150-163. doi:10.1109/TNET.2009.2026901

[6]   B. Xiao and B. Yu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks,” Parallel and Distributed Processing Symposium. IPDPS 2006. 20th International, 25-29 April 2006, pp. 25-29

[7]   H. J. Deng, X. M. Sun, B. W. Wang and Y. F. Cao, “Selective Forwarding Attack Detection Using Watermark in WSNs,” ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8-9 August 2009, Vol. 3, pp. 109-113. doi:10.1109/CCCM.2009.5268016

[8]   B. Xiao, B. Yu and C. S. Gao, “Chemas: Identify Suspect Nodes in Selective Forwarding Attacks,” Journal of Parallel and Distributed Computing, Vol. 67, No. 11, 2007, pp. 1218-1230. doi:10.1016/j.jpdc.2007.04.014

[9]   R. Szewczyk, A. Perrig, J. D. Tyger, V. Wen, V. Wen and D. E. Culler, “Spins: Security Protocols for Sensor Networks,” Proceedings of ACM MobiHoc, Annapolis, June 2003, pp. 177-188.

 
 
Top