Browse > Article
http://dx.doi.org/10.9709/JKSS.2010.19.2.073

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme  

Lee, Sang-Jin (성균관대학교 전지전기컴퓨터공학과)
Kim, Jong-Hyun (성균관대학교 전지전기컴퓨터공학과)
Cho, Tae-Ho (성균관대학교 전지전기컴퓨터공학과)
Abstract
A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.
Keywords
Wireless sensor network; Selective forwarding forwarding attacks; CHEMAS; ACK_TTL;
Citations & Related Records
연도 인용수 순위
  • Reference
1 I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirici, "A survey on sensor networks," IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, Aug. 2002.   DOI   ScienceOn
2 D. Djenouri and L. Khelladi, "A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks," IEEE Communication Surveys and Tutorials, Vol. 7, No. 4, pp. 2-28, December 2005.   DOI
3 Zhu S, Setia S, Jajodia S, Ning P. "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," In Proc. S&P, pp. 259-271, 2004.
4 H.Y. Lee and T.H. Cho, "Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks," Lect. Notes Comput. Sc., Vol. 4317, pp.116-127, Dec. 2006.
5 Ye F, Luo H, Lu S. Statistical En-Route Filtering of Injected False Data in Sensor Networks. IEEE J. Sel. Area Comm., 23(4): pp. 839-850, 2005.   DOI
6 F. Li and J. Wu, "A probabilistic voting-based filtering scheme in wireless sensor networks," Proc. IWCMC, pp. 2732, July 2006.
7 B. Xia, B. Yu, C. Gao, "CHEMAS: Identify suspect nodes in selective forwarding attacks," Journal of Parallel and Distributed Computing, vol. 67 issue 11, pp. 1218-1230, Apr. 2007.   DOI   ScienceOn
8 Karlof, C., Wagner, D. 2003. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier's Ad Hoc Networks Journal, Special Issue on Sensor Network Protocols and Applications, 1( 2-3), 293-315.
9 N. Al-Karaki, and A.E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communication Magazine, Vol. 11, No. 6, pp. 6-28, 2004.   DOI   ScienceOn
10 B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," in ACM SenSys, 2003.
11 T.H. Hai, E. Huh, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge", in Proceeding of Seventh IEEE International Symposium on Network Computing and Applications, 2008.
12 B.H. Kim and T.H. Cho, "Condition-based Key Dissemination Period Determining Method in Sensor Networks", In Proc. Of ICACT, 2008.
13 Perrig A, Szewczyk R, Tygar J D, Wen V, Culler D E. SPINS: Security Protocols for Sensor Networks. Wirel. Netw., 8(5): 521-534, 2002.   DOI   ScienceOn
14 Intanagonwiwat, C., Govindan, R., Estrin, D., Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. Proc. of MOBICOM, 56-67, ACM, 2000.
15 FFLL, http://ffll.sourceforge.net