Cargando…
A Security Mechanism for Cluster-Based WSN against Selective Forwarding
A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5038810/ https://www.ncbi.nlm.nih.gov/pubmed/27657073 http://dx.doi.org/10.3390/s16091537 |
_version_ | 1782455957588017152 |
---|---|
author | Zhou, Hai Wu, Yuanming Feng, Li Liu, Daolei |
author_facet | Zhou, Hai Wu, Yuanming Feng, Li Liu, Daolei |
author_sort | Zhou, Hai |
collection | PubMed |
description | A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy). |
format | Online Article Text |
id | pubmed-5038810 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-50388102016-09-29 A Security Mechanism for Cluster-Based WSN against Selective Forwarding Zhou, Hai Wu, Yuanming Feng, Li Liu, Daolei Sensors (Basel) Article A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy). MDPI 2016-09-20 /pmc/articles/PMC5038810/ /pubmed/27657073 http://dx.doi.org/10.3390/s16091537 Text en © 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zhou, Hai Wu, Yuanming Feng, Li Liu, Daolei A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_full | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_fullStr | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_full_unstemmed | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_short | A Security Mechanism for Cluster-Based WSN against Selective Forwarding |
title_sort | security mechanism for cluster-based wsn against selective forwarding |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5038810/ https://www.ncbi.nlm.nih.gov/pubmed/27657073 http://dx.doi.org/10.3390/s16091537 |
work_keys_str_mv | AT zhouhai asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT wuyuanming asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT fengli asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT liudaolei asecuritymechanismforclusterbasedwsnagainstselectiveforwarding AT zhouhai securitymechanismforclusterbasedwsnagainstselectiveforwarding AT wuyuanming securitymechanismforclusterbasedwsnagainstselectiveforwarding AT fengli securitymechanismforclusterbasedwsnagainstselectiveforwarding AT liudaolei securitymechanismforclusterbasedwsnagainstselectiveforwarding |