Cargando…

Multi-Layer Approach for the Detection of Selective Forwarding Attacks

Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deploy...

Descripción completa

Detalles Bibliográficos
Autores principales: Alajmi, Naser, Elleithy, Khaled
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701335/
https://www.ncbi.nlm.nih.gov/pubmed/26610499
http://dx.doi.org/10.3390/s151129332
_version_ 1782408463798763520
author Alajmi, Naser
Elleithy, Khaled
author_facet Alajmi, Naser
Elleithy, Khaled
author_sort Alajmi, Naser
collection PubMed
description Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.
format Online
Article
Text
id pubmed-4701335
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-47013352016-01-19 Multi-Layer Approach for the Detection of Selective Forwarding Attacks Alajmi, Naser Elleithy, Khaled Sensors (Basel) Article Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. MDPI 2015-11-19 /pmc/articles/PMC4701335/ /pubmed/26610499 http://dx.doi.org/10.3390/s151129332 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Alajmi, Naser
Elleithy, Khaled
Multi-Layer Approach for the Detection of Selective Forwarding Attacks
title Multi-Layer Approach for the Detection of Selective Forwarding Attacks
title_full Multi-Layer Approach for the Detection of Selective Forwarding Attacks
title_fullStr Multi-Layer Approach for the Detection of Selective Forwarding Attacks
title_full_unstemmed Multi-Layer Approach for the Detection of Selective Forwarding Attacks
title_short Multi-Layer Approach for the Detection of Selective Forwarding Attacks
title_sort multi-layer approach for the detection of selective forwarding attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701335/
https://www.ncbi.nlm.nih.gov/pubmed/26610499
http://dx.doi.org/10.3390/s151129332
work_keys_str_mv AT alajminaser multilayerapproachforthedetectionofselectiveforwardingattacks
AT elleithykhaled multilayerapproachforthedetectionofselectiveforwardingattacks