Next Article in Journal
Impact of Heterogeneity and Secrecy on theCapacity of Wireless Sensor Networks
Previous Article in Journal
New Vehicle Detection Method with Aspect Ratio Estimation for Hypothesized Windows
Open AccessArticle

PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

1
School of Information Science and Engineering, Central South University, ChangSha 410083, China
2
Department of Information and Electronic Engineering, Muroran Insitute of Technology, Hokkaido 050-8585, Japan
*
Author to whom correspondence should be addressed.
Academic Editor: Leonhard M. Reindl
Sensors 2015, 15(12), 30942-30963; https://doi.org/10.3390/s151229835
Received: 17 October 2015 / Revised: 19 November 2015 / Accepted: 4 December 2015 / Published: 9 December 2015
(This article belongs to the Section Sensor Networks)
In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. View Full-Text
Keywords: wireless sensor networks; selective forwarding attack; malicious node; network lifetime wireless sensor networks; selective forwarding attack; malicious node; network lifetime
Show Figures

Figure 1

MDPI and ACS Style

Liu, A.; Dong, M.; Ota, K.; Long, J. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs. Sensors 2015, 15, 30942-30963.

Show more citation formats Show less citations formats

Article Access Map by Country/Region

1
Back to TopTop