Next Article in Journal
An Analytic Model for the Success Rate of a Robotic Actuator System in Hitting Random Targets
Next Article in Special Issue
A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes
Previous Article in Journal
Pothole Detection System Using a Black-box Camera
Previous Article in Special Issue
Hiding the Source Based on Limited Flooding for Sensor Networks

Multi-Layer Approach for the Detection of Selective Forwarding Attacks

Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT 06604, USA
Authors to whom correspondence should be addressed.
Academic Editor: Rongxing Lu
Sensors 2015, 15(11), 29332-29345;
Received: 22 September 2015 / Revised: 13 November 2015 / Accepted: 16 November 2015 / Published: 19 November 2015
(This article belongs to the Special Issue Security and Privacy in Sensor Networks)
Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. View Full-Text
Keywords: wireless sensor networks; selective forwarding attacks wireless sensor networks; selective forwarding attacks
Show Figures

Figure 1

MDPI and ACS Style

Alajmi, N.; Elleithy, K. Multi-Layer Approach for the Detection of Selective Forwarding Attacks. Sensors 2015, 15, 29332-29345.

AMA Style

Alajmi N, Elleithy K. Multi-Layer Approach for the Detection of Selective Forwarding Attacks. Sensors. 2015; 15(11):29332-29345.

Chicago/Turabian Style

Alajmi, Naser, and Khaled Elleithy. 2015. "Multi-Layer Approach for the Detection of Selective Forwarding Attacks" Sensors 15, no. 11: 29332-29345.

Find Other Styles

Article Access Map by Country/Region

Only visits after 24 November 2015 are recorded.
Back to TopTop