Cargando…
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deploy...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701335/ https://www.ncbi.nlm.nih.gov/pubmed/26610499 http://dx.doi.org/10.3390/s151129332 |
_version_ | 1782408463798763520 |
---|---|
author | Alajmi, Naser Elleithy, Khaled |
author_facet | Alajmi, Naser Elleithy, Khaled |
author_sort | Alajmi, Naser |
collection | PubMed |
description | Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. |
format | Online Article Text |
id | pubmed-4701335 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-47013352016-01-19 Multi-Layer Approach for the Detection of Selective Forwarding Attacks Alajmi, Naser Elleithy, Khaled Sensors (Basel) Article Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. MDPI 2015-11-19 /pmc/articles/PMC4701335/ /pubmed/26610499 http://dx.doi.org/10.3390/s151129332 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Alajmi, Naser Elleithy, Khaled Multi-Layer Approach for the Detection of Selective Forwarding Attacks |
title | Multi-Layer Approach for the Detection of Selective Forwarding Attacks |
title_full | Multi-Layer Approach for the Detection of Selective Forwarding Attacks |
title_fullStr | Multi-Layer Approach for the Detection of Selective Forwarding Attacks |
title_full_unstemmed | Multi-Layer Approach for the Detection of Selective Forwarding Attacks |
title_short | Multi-Layer Approach for the Detection of Selective Forwarding Attacks |
title_sort | multi-layer approach for the detection of selective forwarding attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701335/ https://www.ncbi.nlm.nih.gov/pubmed/26610499 http://dx.doi.org/10.3390/s151129332 |
work_keys_str_mv | AT alajminaser multilayerapproachforthedetectionofselectiveforwardingattacks AT elleithykhaled multilayerapproachforthedetectionofselectiveforwardingattacks |