Cargando…

A Security Mechanism for Cluster-Based WSN against Selective Forwarding

A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhou, Hai, Wu, Yuanming, Feng, Li, Liu, Daolei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2016
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5038810/
https://www.ncbi.nlm.nih.gov/pubmed/27657073
http://dx.doi.org/10.3390/s16091537
_version_ 1782455957588017152
author Zhou, Hai
Wu, Yuanming
Feng, Li
Liu, Daolei
author_facet Zhou, Hai
Wu, Yuanming
Feng, Li
Liu, Daolei
author_sort Zhou, Hai
collection PubMed
description A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy).
format Online
Article
Text
id pubmed-5038810
institution National Center for Biotechnology Information
language English
publishDate 2016
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-50388102016-09-29 A Security Mechanism for Cluster-Based WSN against Selective Forwarding Zhou, Hai Wu, Yuanming Feng, Li Liu, Daolei Sensors (Basel) Article A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy). MDPI 2016-09-20 /pmc/articles/PMC5038810/ /pubmed/27657073 http://dx.doi.org/10.3390/s16091537 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zhou, Hai
Wu, Yuanming
Feng, Li
Liu, Daolei
A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_full A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_fullStr A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_full_unstemmed A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_short A Security Mechanism for Cluster-Based WSN against Selective Forwarding
title_sort security mechanism for cluster-based wsn against selective forwarding
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5038810/
https://www.ncbi.nlm.nih.gov/pubmed/27657073
http://dx.doi.org/10.3390/s16091537
work_keys_str_mv AT zhouhai asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT wuyuanming asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT fengli asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT liudaolei asecuritymechanismforclusterbasedwsnagainstselectiveforwarding
AT zhouhai securitymechanismforclusterbasedwsnagainstselectiveforwarding
AT wuyuanming securitymechanismforclusterbasedwsnagainstselectiveforwarding
AT fengli securitymechanismforclusterbasedwsnagainstselectiveforwarding
AT liudaolei securitymechanismforclusterbasedwsnagainstselectiveforwarding