Next Article in Journal
A Laser Line Auto-Scanning System for Underwater 3D Reconstruction
Previous Article in Journal
Fabrication of Micro-Needle Electrodes for Bio-Signal Recording by a Magnetization-Induced Self-Assembly Method
Article Menu

Export Article

Open AccessArticle
Sensors 2016, 16(9), 1537; doi:10.3390/s16091537

A Security Mechanism for Cluster-Based WSN against Selective Forwarding

School of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, China
*
Author to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Received: 21 July 2016 / Revised: 9 September 2016 / Accepted: 14 September 2016 / Published: 20 September 2016
(This article belongs to the Section Sensor Networks)
View Full-Text   |   Download PDF [2021 KB, uploaded 20 September 2016]   |  

Abstract

A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network’s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH’s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node’s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy). View Full-Text
Keywords: selective-forwarding; inspector node; reputation value; IDS; cluster-based WSN selective-forwarding; inspector node; reputation value; IDS; cluster-based WSN
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Zhou, H.; Wu, Y.; Feng, L.; Liu, D. A Security Mechanism for Cluster-Based WSN against Selective Forwarding. Sensors 2016, 16, 1537.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top