Next Article in Journal
Developing a CNT-SPE Sensing Platform Based on Green Synthesized AuNPs, Using Sargassum sp.
Next Article in Special Issue
Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone
Previous Article in Journal
On the Design of Dual-Polarised Linear Antenna Arrays with Enhanced Port-to-Port Isolation
Previous Article in Special Issue
Addressing the Security Gap in IoT: Towards an IoT Cyber Range
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks

by
Abdelouahid Derhab
1,*,
Abdelghani Bouras
2,
Mohamed Belaoued
3,
Leandros Maglaras
4,* and
Farrukh Aslam Khan
1
1
Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh 11451, Saudi Arabia
2
Department of Industrial Engineering, College of Engineering, Alfaisal University, Riyadh 11533, Saudi Arabia
3
LICUS Laboratory, Department of Computer Science, University of 20 August 1955, Skikda 21000, Algeria
4
School of Computer Science and Informatics, De Montfort University, Leicester LE1 9BH, UK
*
Authors to whom correspondence should be addressed.
Sensors 2020, 20(21), 6106; https://doi.org/10.3390/s20216106
Submission received: 15 July 2020 / Revised: 19 October 2020 / Accepted: 21 October 2020 / Published: 27 October 2020
(This article belongs to the Special Issue Sensors Cybersecurity)

Abstract

:
In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow conservation constraints to monitor all of its neighbors. Three constraints are applied by using one-hop knowledge, and the fourth one is calculated by monitoring two-hop information. The latter is obtained by proposing two-hop energy-efficient and secure reporting scheme. We theoretically analyze the security and performance of the proposed intrusion detection method. We also show the superiority of relaxed flow conservation constraint in defending against upstream node attack compared to other schemes. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness.

1. Introduction

A Wireless Sensor Network (WSN) [1] is a set of tiny sensor nodes, which are resource-constrained in terms of energy, bandwidth, processing, and storage capacities. The main task of a WSN is to collect/aggregate data from the sensor nodes to a base station (or sink) using a hop-by-hop communication. The data collection can be either event-driven or periodic-based. In the event-driven class, data are delivered to the sink after the occurrence of events. In the periodic-based class, each sensor node periodically sends its measurement towards the sink.
Sensor nodes could be compromised and controlled by an attacker. For example, an adversary can perform node capture attack by physically accessing the sensor node and uploading a malicious code to launch different types of attacks [2,3]. To avoid this situation, some preventive security mechanisms such as authentication, cryptography, and key management could be implemented [4,5]. However, it is necessary to deploy intrusion detection systems (IDSes) [6,7,8,9] to deal with other non-preventive attacks, such as selective routing/forwarding attack, where a malicious node refuses to forward some/all data packets that it receives. Some of the intrusion detection schemes that are proposed to deal with this attack use the watchdog principle, in which a node u that sent a packet to node v can overhear whether v has forwarded the packet to its downstream neighbor (or next hop) along the path towards the sink or not.
This attack has been tackled in many research studies [10,11,12,13,14,15,16,17,18,19,20,21,22,23]. The simplest way to detect a selective routing attack is to use the watchdog technique. This istechnique not sufficient for detecting the selective routing attack as the leaf nodes, for example, in the tree-based topology are not monitored. Hence, it is important to increase the coverage of monitoring by including the upstream neighbors (previous hop). In addition, in some routing schemes [24,25,26], a node that is at l-hop away from the sink can choose its next hop from l-hop, ( l + 1 ) -hop, and ( l 1 ) -hop away from the sink node. Thus, it is important for each node to monitor all its neighbors to make a correct routing choice.
The role of an IDS is to identify the malicious nodes. The detection effectiveness of the IDS depends on the features that are used to describe the node’s normal behavior. If the feature with respect to the monitored node exceeds a defined threshold, then the node is considered as malicious. However, adopting some features might mislead the detection system, and make it falsely accuse a legitimate node as malicious. Figure 1 clearly explains this situation. In the figure, each node monitors the packet receiving rate of its upstream neighbor along the path toward the sink B. The value above each link ( a , b ) indicates the sending rate (resp., receiving rate) to b (resp., from a). Figure 1a shows the normal traffic rates of the network. Figure 1b shows the state of the network when nodes D, H, and K become compromised and start behaving maliciously by dropping some packets. As D, H, and K reduce their sending rates, their respective downstream neighbors I and L also have to reduce their sending rates accordingly. As a result, node B will falsely accuse nodes I and L of being malicious and, hence, a false positive is recorded. This attack is called upstream-node effect, i.e., node is falsely accused as malicious because its upstream node is behaving maliciously.
In this paper, we propose an intrusion detection system, which aims to detect the selective routing attack, prevents the upstream-node effect, and ensures that each node can monitor all its neighbors. The main contributions of the paper are the following:
  • We propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node effect. It determines a boundary (i.e., threshold), which separates between normal packet loss and packet loss due to attacks. Instead of building the classifier using constrained optimization problem, as in one-class SVM [27], the proposed classifier has two main characteristics: (1) it incurs less computational cost and (2) it is most appropriate for networks that are operating under quasi-stable conditions in terms of link quality. In this case, the instances that compose the normal training data set are close to each other and can be grouped into one small bounded interval.
  • We use four variants of the relaxed flow conservation constraint, depending on the type of monitored node. Three constraints are applied using one-hop knowledge, and the fourth one is applied while using two-hop information. To obtain the two-hop information, we propose the two-hop energy-efficient reporting scheme, which is complemented with some security mechanisms, such as authentication, encryption, filtering of ratings, and isolation.
  • We analyze the security of the proposed IDS as well as its resilience probability against selective routing attacks and unfair ratings. Contrary to the state-of-the art methods, we show that the relaxed flow conservation constraint prevents the upstream node effect. We also analytically and experimentally evaluate the performance of the proposed IDS-based relaxed flow conservation constraints.
The rest of the paper is organized, as follows: Section 2 presents the related work. Section 3 provides the system model and problem statement. In Section 4, we justify our design choices. Section 5 describes the intrusion detection system that is based on the relaxed flow conservation constraints. In Section 6, we analyze the security of the proposed IDS against some attacks as well as its resilience probability against selective routing attacks and unfair ratings. In Section 7, we evaluate the resiliency of the relaxed flow conservation constraint against upstream-node effect and then compare it with two state-of-the-art features. The analysis of performance complexity, and node lifetime estimation are provided in Section 8. In Section 9, we present the simulation results. Finally, Section 10 concludes the paper.

2. Related Work

2.1. Intrusion Detection Schemes for Selective Routing Attacks

The selective routing attack has been widely studied in the literature. In order to counter the selective routing attack, Karlof et al. [28] suggested sending the same packet on a set of disjoint paths. However, this method shows poor security resilience if there is at least one compromised node along each disjoint path. It also incurs high communication overhead and high energy consumption when the number of paths increases.
In [11], each node counts the number of packets not forwarded by its downstream node. If this number exceeds a given threshold, then an alarm is raised. In [10], each node counts the number of packets not forwarded by its neighbor node within a time window; if the majority of monitoring nodes produce an alarm regarding the same node, the latter will be considered to be malicious. This method incurs a communication cost of O ( N ) , where N is the number of nodes in the network. In [23], each node calculates the received power rate and the arrival packet rate of its upstream neighbor.
Stetsko et al. [12] proposed an intrusion detection system based on collaboration between neighbor nodes. They built a profile of the monitored node that consists of two features: (i) packet dropping rate, defined as: the number of packets sent to a certain node during a predefined period of time but not forwarded by that node and (ii) packet forwarding rate, defined as the number of packets received from its neighbors and consequently forwarded to its parent node during a predefined period of time. Each measured profile is then broadcast to its neighbors. In this way, the monitoring node can have different records on the same monitored node and can select the most accurate one. The main drawback is that it is not explained how accurate records are selected and how it is possible to detect unfair records provided by dishonest nodes.
Yu et al. [13,17] proposed a scheme that chooses some nodes as checkpoints along the path. When a checkpoint node receives a packet, it sends an acknowledgment (ACK) packet to the source node via its upstream neighbor. If any intermediate node does not receive enough ACK packets from its downstream neighbor during a time period, then it suspects that the packets have been dropped by a downstream malicious node. In addition, each node uses a one-way hash key chain to ensure the authenticity of packets. The problem with this scheme is that it consumes considerable energy on sending acknowledgement packets and it does not seem suitable for resource-constrained WSNs. If L is the average path length, then there is a need to forward O ( | C H K | L ) ACK packets for each data packet, where | C H K | is the number of checkpoint nodes along a path. If L is proportional to N and m data packets are generated during each time period, then the overall message complexity of this scheme for N nodes is O ( | C H K | × m × N 3 2 ) /time period. In addition, it might detect the existence of malicious activities but cannot identify exactly which node is malicious.
Brown and Du [16] proposed a cluster-based scheme in order to detect selective routing attack using a heterogeneous WSN consisting of a few high-end sensor nodes (H-sensors or cluster heads) and a large number of Low-end sensor nodes (L-sensors). The detection procedure is as follows: each monitoring node passively listens to its downstream node. If the latter drops a packet, then the monitoring node (L-sensor) will include the ID of the dropper node in a packet and send it to the cluster head via another route. Based on the reports, the cluster head performs the sequential probability ratio test, which calculates the percentage of dropped packets in all forwarding packets, to check whether the L-sensor is compromised or not. This scheme has the following drawbacks: (1) it suffers from the single node failure problem when the cluster head is compromised and (2) no reliable mechanism is proposed to retransmit the dropped packets.
Li et al. [18] proposed a detection scheme based on the sequential mesh test method [29]. In [18], the network is organized into clusters, and any node that does not observe the forwarding of its downstream neighbor sends a report packet to the cluster head. The latter runs a sequential mesh test, which extracts a small quantity of samples to run the test, instead of regulating the total time of test in advance. This scheme also suffers from the single node failure problem.
Xin-sheng et al. [15] proposed a detection scheme based on a hexagonal WSN mesh topology. This scheme uses the nodes, which are capable of monitoring the forwarding of two successive nodes in the routing path. When these monitoring nodes detect selective routing attack, they resend the dropped packets to the destination node. The problem with this scheme is that it depends on a static and specific kind of topology. In addition, there is no countermeasure mechanism when the monitoring node is compromised.
Kaplantzis et al. [14] proposed a centralized intrusion detection scheme that is based on One-class Support Vector Machines (OSVMs). The detection process is performed by the sink and uses two features, the incoming bandwidth, and the hop count taken by each packet to reach the sink node, in order to detect selective routing and black hole attacks. If the observed behavior is different from the trained one, then a detection alarm is raised.
Jamshidi et al. [30] proposed a distributed lightweight method based on learning automata in order to select the most secure routes for forwarding packets, and thus avoiding those that contain malicious nodes. Fu et al. [31] proposed data clustering algorithm to detect and isolate malicious cluster heads that launch selective routing attacks. Mehetre et al. [32] introduced a trustable secure routing method for clustered WSNs that can also offer security through encryption and verification of packets on each source node. The proposed method offers advanced security, privacy, and energy efficiency features, but it is a rather heavyweight method for WSNs both in terms of computational overhead and increased complexity.

2.2. Discussion and Desired Design Principles

We can observe that the majority of schemes that are against selective routing attacks perform a downstream monitoring, which does not allow for a node to ensure monitoring coverage of all its neighbors. We can also observe that the majority of works use the following features to describe the node’s behavior: packet dropping rate, packet forwarding rate, packet arrival rate, and number of Ack packets (i.e., number of received packets). In Section 7, we will show that these features do not prevent the upstream-node effect and, hence, they incur poor detection accuracy and a high false positive rate. Thus, an IDS against the selective routing attack should have the following properties:
  • Effectiveness: the IDS should provide high detection rate while providing low false positive rate. This aim is ensured by using path-free features to describe the node’s behavior.
  • Full network monitoring coverage: the IDS should be able to monitor the whole network. To achieve this, each node should include downstream and upstream monitoring processes.
  • Localized and fully-distributed: the IDS should be localized, i.e., the tasks of each node, e.g., data acquisition and data analysis should be based solely on the knowledge of its local neighborhood. The watchdog technique, in which a node listens promiscuously to packets passing by its neighborhood, is a good example of a localized solution as it does not incur any additional communication overhead. Additionally, the IDS should be distributed across different nodes, and does not rely on a centralized entity to avoid the single-point-of-failure problem.
  • Minimized resource consumption: the IDS should be designed in a way that it can be lightweight and implementable in the resource-constrained sensor nodes by using only a small number of resources. Additionally, it is important that the IDS incurs less communication overhead to reduce energy consumption and prolong the node and network lifetime.

3. System Model and Problem Statement

Given a set of N sensor nodes and a sink node, the network is structured as a tree-topology rooted at the sink. At every time interval Δ t , each node i sends a data packet along the tree towards the sink node, and monitors a set of nodes W i L i , such that L i denotes the set of i’s neighbors. We consider two forms of the selective routing attack:
  • An attacker i drops some/all data packets coming from all its upstream neighbors.
  • An attacker stops generating its own data packets.
At every time interval Δ j = Δ , called the monitoring period, each node i, which monitors node k’s behavior, constructs a vector (or profile) a j i k N d that is composed of d attributes { a j l i k : l = 1 d } . The attributes can denote: the number of dropped packets, the number of received packets, the number of generated packets, etc. To be able to perform monitoring, Δ j must be larger than Δ t . We remove the superscripts i and k to ease the notation burden.
After a time period T, each sensor node has collected a set of n d-attribute profile vectors a j = { a j l : l = 1 d } , called the training data set. The latter can also be written as d × n matrix [ a j l ] , where a j l is the number of occurrence of feature l in profile a j and n is the number of profiles. A profile a j can be a one-attribute vector that records, for example, the number of packets sent/forwarded by the monitored node during the monitoring period Δ j .
During the testing phase, the intrusion detection problem is to check at each Δ j (such that j > n ) if the observed profile a j is normal or not.

4. Design Choices

4.1. One-Class Classifier

Statistical-based and rule-based approaches [10,33,34] use some thresholds to distinguish between normal and abnormal behaviors. These thresholds depend on some physical parameters, like signal noise and other radio parameters that vary from a network deployment scenario to another. Hence, it is not feasible to calculate the required threshold for each network deployment and upload the corresponding binary code to the sensor node.
The one-class classifier (OCC) assumes that all of the training instances belong to one class, named positive class. The negative class, which represents abnormal behavior is absent or unknown. The aim of the classifier is to find a separating boundary between the normal instances and the rest of instances [35]. The OCC is solved using either density estimation or boundary description methods. In the density estimation method, an object is considered to be non-positive (or outlier) when the object falls into a region with a density lower than some threshold value. However, this method requires large data sets [36]. In the boundary description method, the classifier sets a boundary that encompasses almost all of the positive points with the minimum radius. Any test instance that does not fall within the learned boundary is declared as anomalous. The main issue that arises is when the training data set is composed of different regions with different density levels. Instances in low-density regions will be rejected although they are normal. Additionally, when the boundary of the dataset is long and non-convex, the required number of training instances is likely to be very high [35]. Thus, the one-class classifier gives its best results in terms of detection rate and false positive rate when the training instances are close to each other and can be grouped into one small region. The question that might arise is whether this small region can be constructed in WSNs or not. To answer this question, we are going to state the following observations and results.
Lin et al. [37] experimentally studied the stability of a testbed WSN. In this study, the transmissions are scheduled to avoid collisions and it is observed that the packet reception ratio of stable links (i.e., link quality remains constant at a certain level) are experiencing small fluctuations that are mainly caused by multi-path fading of wireless signals. According to this study, this case occurs, especially at night when there is no human movement or Wi-Fi interference.
DOZER [38], KOALA [39], and DISSENSE [40] are three periodic-based data collection protocols that are designed for long-term monitoring applications in WSNs, and have been implemented and tested on real platforms. DOZER and DISSENSE provide a packet delivery ratio of 98–99%. KOALA, on the other hand, achieves a ratio of 99.99%. This implies that the average packet reception ratio of a link is also lower-bounded by 98–99%.
The above results show that the instances comprising the normal traffic behavior (i.e., number of received packets) are close to each other and, hence, it is possible to build a small bounded region composing all these instances. This implies that the choice of one-class classifier here is appropriate and justified to monitor stable links or WSNs under quasi-stable conditions (i.e., constant flow rate, collision-free transmissions, no mobility, no signal interference, …, etc). The boundary, which separates between normal traffic and attack, is self-learned from each deployment setting, and it does not depend on a predefined threshold as in the statistical-based and rule-based approaches. In this situation, we adopt the one-class classifier to train the intrusion detection system.

4.2. Path-Free Features

The feature is a quantitative metric used by the monitoring node to evaluate the monitored node’s behavior. As our objective is to design an IDS that prevents the upstream-node effect, the computation of the node’s feature must not depend on the features that are related to its upstream node. Thus, we classify the features used to monitor the node’s behavior as path-dependent and path-free.
A feature is called path-dependent if the feature value assigned to a node depends on the feature value assigned to its upstream neighbor. On the other hand, a feature is called path-free if the feature value that is assigned to a node does not depend on the feature value assigned to its upstream neighbor.
Formally, we consider that a data flow is routed along the path [ a , , j , k , l , , b ] . Each node l along the path monitors the activity of its upstream node k and measures the corresponding feature f t k l . A feature is called path-dependent if any increase (resp., decrease) in f t j k will increase (resp., decrease) f t k l . A feature is called path-free if the variation of f t k l does not depend on f t j k . For example, the packet sending rate is a path-dependent feature, as its variation at a given node affects its downstream node. Although the packet dropping and forwarding rates are considered to be path-free according to this definition, they cannot prevent the upstream-node effect, as shown in Section 7.

5. Intrusion Detection Scheme Based on Relaxed Flow Conservation Constraints

As stated in Section 2, the intrusion detection systems for selective routing attacks should at least use (1) downstream and upstream monitoring processes, and (2) path-free features to describe the network traffic. For this purpose, we propose path-free features that are based on the relaxed flow conservation constraint [41].

5.1. One-Dimensional One-Class Classifier: Relaxed Flow Conservation Constraint

We model WSN as a directed tree G = ( V , E ) , where each edge e = ( u , v ) has a defined capacity denoted by C ( e ) or C ( u , v ) . Each node m monitors its downstream neighbor (i.e., m’s parent denoted by P a r e n t m ) and all of its upstream neighbors (i.e., m’s children denoted by C h i l d m ). Based on the known multi-flow problem [42], we define a flow as a function f ( u , v ) : V × V N , which counts the number of packets sent from node u to node v during a monitoring period of length Δ and satisfies the following constraints:
  • Flow conservation constraint: the sum of flows entering v and that generated by v during a monitoring period Δ Δ t must equal the flow leaving v towards P a r e n t v for all nodes, except the sink node and the leaf nodes in the tree-based topology, as depicted in Figure 2. Formally:
    ω C h i l d v f ( ω , v ) + Δ Δ t f ( v , P a r e n t v ) = 0
    A flow f ( u , v ) can also be written as:
    f ( u , v ) = s e l f u + ω C h i l d u g ( ω , u , v )
    such that: s e l f u is the flow actually generated by node u, and g ( ω , u , v ) is the flow received by node u from node ω and forwarded later to node v.
  • Capacity constraint: the flow along any edge must be positive and less than the capacity of that edge. Formally: 0 f ( u , v ) C ( u , v ) .
As the wireless channel is error-prone, some packets could be lost due to collisions, and thus the flow conservation constraint cannot be ensured. To deal with this issue, we use instead a relaxed flow conservation constraint, which represents the difference between (a) the flows leaving v, and (b) the sum of flows entering v and the flow generated by v. The value of this difference is bounded between 0 and a given threshold N * . Our objective is to determine the threshold that encompasses all the normal instances d v such that:
d v = ω C h i l d v f ( ω , v ) + Δ Δ t f ( v , P a r e n t v )
To this end, the relaxed flow conservation constraint can be written as one-dimensional one-class classifier that satisfies the following:
d v max t [ 0 , T ] δ v ( t ) = δ v
where δ v ( t ) denotes the flow drop, defined as the number of packets sent and forwarded by node v and lost due to normal failures during a monitoring period t. δ v is the highest value of d v observed during the training phase T. Formally, we have:
d v = ω C h i l d v f ( ω , v ) + Δ Δ t f ( v , P a r e n t v ) δ v
The above constraint can also be written as:
d v = ω C h i l d v f ( ω , v ) + Δ Δ t s e l f u + ω C h i l d v g ( ω , v , P a r e n t v ) δ v
Proposition 1.
d v is a path-free feature.
Proof. 
Let us consider the path u v P a r e n t v . Let u be a malicious node, which drops some packets. A feature is called dependent-path if and only if any increase in d u will eventually increase d v .
Let f t ( u , v ) , d v t , s e l f v t , and g t ( u , v , P a r e n t v ) be the value of f ( u , v ) , d v , s e l f v and g ( u , v , P a r e n t v ) at time t. d v t can be written as: ω C h i l d v f t ( ω , v ) + Δ Δ t f t ( v , P a r e n t v ) . At time t > ( t + Δ ) node u starts behaving maliciously by dropping some/all packets, its d u t > δ u , and it can be written as: ω C h i l d u f t ( ω , u ) + Δ Δ t f t ( u , v ) . f t ( u , v ) is composed of two terms: s e l f u t and w C h i l d u g t ( w , u , v ) . When u is acting maliciously, s e l f u t < s e l f u t and/or ω C h i l d u g t ( ω , u , v ) < ω C h i l d u g t ( ω , u , v ) , and hence d u t > d u t .
Node v is behaving normally at time t and t . Thus, d v t = ω C h i l d v f t ( ω , v ) + Δ Δ t f t ( v , P a r e n t v ) < δ v , and   d v t = ω C h i l d v f t ( ω , v ) + Δ Δ t f t ( v , P a r e n t v ) < δ v .
As f t ( u , v ) < f t ( u , v ) , w C h i l d v f t ( w , v ) < ω C h i l d v f t ( ω , v ) . In addition, node v will send at time t less packets compared to time t.
Formally, f t ( v , P a r e n t v ) < f t ( v , P a r e n t v ) as: s e l f u t = s e l f u t , and   ω C h i l d v g t ( ω , v , P a r e n t v ) < w C h i l d v g t ( w , v , P a r e n t v )
At time t , there will be less traffic flow in the neighborhood of node v when compared to time t, and we will obviously observe less channel contentions and less packet collisions, which decreases the flow drop. Formally, d v t < d v t . As a result, an increase in d u has not made v increase its d v and, hence, d v is a path-free feature. □
Based on the above constraint, we derive the three following monitoring detection constraints (or path-free features) C1, C2, and C3 used by the monitoring node m to monitor its downstream node v and its upstream node u (as shown in Figure 2).
C 1 : f ( m , v ) g ( m , v , P a r e n t v ) = d v 1 φ m v C 2 : Δ Δ t s e l f u = d u 2 ϕ m u C 3 : ω C h i l d u f ( ω , u ) ω C h i l d u g ( ω , u , m ) = d u 3 ψ m u
φ i j , ϕ i j , and ψ i j denote the thresholds used by the monitoring node m to check constraint (C1), constraint (C2), and constraint (C3) satisfaction with respect to the monitored downstream node v and upstream node u. φ m v , ϕ m u , and ψ m u are the highest values of d v 1 , d u 2 , and d u 3 , respectively, observed by the monitoring node m during the training phase.
C1 (or one-hop downstream monitoring and detection process) can be applied by each sensor node except for the sink node. Node m, using the watchdog technique, checks if the data packets that it has sent to its parent node v are forwarded by the latter. If the difference between the two elements, f ( m , v ) and g ( m , v , P a r e n t v ) , exceeds the threshold φ m v , node v will be considered malicious. Otherwise, it is normal.
C2 (or one-hop upstream monitoring and detection process) can be applied by each sensor node, except for the leaf nodes in the tree-based network topology. As each node u (except the sink node) has to generate Δ Δ t packets during each monitoring period and send them to its parent node. Node m checks if the number of packets s e l f u received from its upstream node u is less than ( Δ Δ t ϕ m u ) . If so, node u is considered to be malicious. If node u is a leaf node, this judgment is sufficient for node m. Otherwise, node m still cannot judge node u and it needs to check constraint (C3).
C3 (or two-hop upstream monitoring and detection process) can be applied by each sensor node except for the leaf nodes as well as their parents in the tree-based network topology. The monitoring node m checks whether the data packets, where node u received from its children, are forwarded by node u to node m. If the difference between the two elements ω C h i l d u f ( ω , u ) and ω C h i l d u g ( ω , u , m ) exceeds the threshold ψ m u , node u will be considered as malicious. Otherwise, it is normal. We can notice that all the terms of constraint (C3) are one-hop information and can be directly obtained by node m, except for ω C h i l d u f ( ω , u ) . The issue here is how to report this two-hop information to node m so that constraint C 3 can be verified.

5.2. Two-Hop Energy-Efficient and Secure Reporting Scheme

In order to report information to a two-hop neighbor (i.e., grandparent in the tree), the trivial solution is that each node ω C h i l d u acts as a witness and sends a packet containing f ( ω , u ) to the monitoring node m through an intermediate node. However, a malicious intermediate node can simply drop this packet and prevent node m from receiving it. The other solution is to use an adaptive power transmission that can reach the two-hop neighbors by using higher power transmission level. However, this solution exhausts the node’s battery faster than the normal power and makes the packet contend with more transmitting nodes.
To address the above drawbacks, we propose an energy-efficient and secure method, allowing for nodes that can monitor the flows entering and leaving u to report their observations to the monitoring node m.

5.2.1. Witness Set Model

When the monitoring node m cannot judge directly based on its own observations whether the behavior of its upstream node u is normal or not, it has to collect ratings on node u from other nodes, called the witness nodes. Witness nodes that can rate u are: (1) nodes, which can overhear the transmission of node u and at least one of u’s children and (2) u’s children.
To define the set of witness nodes, as denoted by W N u , which can rate node u, we have to define first the witness region for the transmitter relay pair ( ω , u ) as:
W R ω u = { p = ( x , y ) R 2 : d i s ( p , ω ) r d i s ( p , u ) r }
where r denotes the node transmission radius, and d i s ( p 1 , p 2 ) denotes the euclidean distance between two points p 1 and p 2 . Figure 3a shows the witness region for ( u 1 , u ) as shaded region. The total witness region for node u, which is shown in Figure 3b, is defined by W R u = ω C h i l d u W R ω u .
The set of witness nodes W N u are the nodes that are located in the witness region W R u , except for node u. Let us consider that a witness node w can overhear the transmission between a set of nodes C h i l d u [ w ] C h i l d u and node u. The witness node w applies the following constraint C4 to rate node u.
C 4 :   w i t w u = ω C h i l d u [ w ] f ( ω , u ) ω C h i l d u [ w ] g ( ω , u , P a r e n t u ) χ w u
C4 (or one-hop witness monitoring and detection process) node w checks if the data packets, which were sent by nodes C h i l d u [ w ] to node u, are forwarded by node u. If the difference between the two elements: ω C h i l d u [ w ] f ( ω , u ) and ω C h i l d u [ w ] g ( ω , u , P a r e n t u ) exceeds the threshold χ w u , node u will be considered as malicious. Otherwise, it is normal. χ w u is the highest value of w i t w u recorded by node w while observing node u during the training phase.
If a witness node gives fair rating, then it is called honest. Otherwise, it is called liar. We can notice that each witness node located in W R u partially monitors the traffic flow coming to node u. As C h i l d u [ w ] C h i l d u [ w ] , the amount of traffic monitored by w differs from that of w’ and, hence, it is impossible to fairly compare between two ratings w i t w u and w i t w u that resulted from different observations and tell which one is honest or liar. Figure 3 shows that the nodes, which are witnessing node u, are { w 1 , w 2 , u 1 , u 2 , u 3 } . Nodes w 1 , u 1 , and u 2 can only monitor the traffic flows ( u 1 , u ) and ( u 2 , u ) . On the other hand, nodes w 2 , u 1 , and u 3 can only monitor the traffic flows ( u 1 , u ) and ( u 3 , u ) . To deal with this issue, we use binary values to rate node u. Formally, the reputation rating held by witness node w about node u, denoted as r a t i n g w u , is set to 1 if u is normal and 0 otherwise.

5.2.2. Two-Hop Energy-Efficient Reporting Scheme

We propose a lightweight method for reporting node w’s opinions about node u to node P a r e n t u = m . Each node i stores the following variables: (1) C h i l d i (i.e., the set of i’s upstream nodes in the tree-based routing topology), (2) W i t n e s s i n g i (i.e., the set of witness nodes that can monitor any node in C h i l d i ), (3) W i t n e s s e d i (i.e., the set of nodes that node i can monitor, ordered according to the lexicographical order (where 0 < 1 < 2 )), (4) R e l a y i (i.e., the set of witness nodes that use i as a relay to reach their two-hop monitoring nodes). The method is executed in two phases: (a) initialization phase, executed once, and (b) a rating phase, executed periodically. Figure 4 shows the value of some variables that resulted from executing the reporting scheme. In the figure, the directed links represent the tree-based routing topology, and a dotted line drawn from a node w to link ( ω , u ) indicates that w can overhear the messages transmitted by ω and u.
In the initialization phase, the following operations are carried out:
  • Each witness node w that can observe the network traffic traversing the link ( ω , u ) adds u to the set W i t n e s s e d w . Subsequently, w broadcasts W i t n e s s e d w with T T L = 2 .
  • When a monitoring node m receives W i t n e s s e d w and W w = { C h i l d m W i t n e s s e d w } Ø (i.e., w can monitor at least one of i’s children), m adds w to W i t n e s s i n g m . Subsequently, it stores for each p W w the position of p in W i t n e s s e d w . Afterwards, node m broadcasts a message containing W i t n e s s i n g m . In Figure 4, as node 3 can observe node m’s children, it is added to W i t n e s s i n g m .
  • When a node r receives W i t n e s s i n g m , it checks for all j W i t n e s s i n g m if ( j N r j N m ) (i.e., witness node j cannot reach m directly, but only through r). If so, it adds j to R e l a y r .
In the rating phase, each node i has to report periodically its observations and forward the observations of nodes in R e l a y i to the monitoring nodes (i.e., ( | R e l a y i | + 1 ) observations are periodically reported by node i). Each observation from node w has to include the ID of all nodes j W i t n e s s e d w and their ratings. As N is the total number of nodes, the ID and the rating can be encoded using log 2 N bits and one bit, respectively. Thus, the size of this observation is: | W i t n e s s e d w | ( log 2 N + 1 ) bits, and the total size of information that is transmitted periodically by each node i is ( w R e l a y i | W i t n e s s e d w | + | W i t n e s s e d i | ) ( log 2 N + 1 ) bits. | R e l a y i | and | W i t n e s s e d w | are upper-bounded by d m a x , where d m a x is the maximum node degree of the network. As, for example, let us consider N = 1024 and d m a x = 10 , the size of one observation is 110 bits, and the total size of observations to be sent by node i is: 1210 bits. To reduce this size, we apply a spatial-temporal compression, as follows:
  • Spatial compression: as the monitoring node knows the position of its children in W i t n e s s e d w , we do not need to transmit the couple ( j , r a t i n g w j ) for each j W i t n e s s e d w . Instead, w’s observation will consist of w’s ID, and a boolean bit vector, denoted by R e p w and composed of | W i t n e s s e d w | bits. R e p w [ i ] = 1 if r a t i n g w j = 1 (i.e., node j, which is at position i in W i t n e s s e d w , is rated normal by w, and 0 otherwise). In Figure 4, node m knows that the third and the fourth elements in R e p 3 correspond to the ratings of its children 11 and 12, respectively. The size of one observation is reduced to ( log 2 N + | W i t n e s s e d w | ) bits. The above example gives 20 bits per observation.
  • Temporal compression: instead of transmitting all of the observations in one message, each node i piggybacks each observation to one beacon message. To do so, it defines a time window T R i composed of T B × ( | R e l a y i | + 2 ) time slots, where T B is the time between two beacon broadcasts. | R e l a y i | slots are used to relay the ratings sent by nodes in R e l a y i . The last two time slots are used to send i’s observation: one encrypted and sent to other relay nodes to reach i’s two-hop monitoring nodes, and the non encrypted is broadcast by i to reach i’s one-hop monitoring nodes. The encryption mechanism is described in Section 5.2.3.

5.2.3. Security Mechanisms for the Reporting Scheme

The observations that are exchanged among nodes are subject to many attacks, which aim at spoofing the source of observations and/or altering their contents. Thus, we enhance the two-hop energy-efficient reporting scheme by adding some security mechanisms.
In order to prevent the relay node r from altering the observations sent by w, each node i creates its two-hop broadcast key T H K i , which is a shared key between the node and its two-hop neighbors. This key is unknown for the one-hop neighbors. The creation of this key, as described in [43], is as follows: Each node i is preloaded with a transitory initial key K I N and a random number R N i . It first computes its master key M K i = G ( K I N , I D i ) , where G is pseudo random function and I D i is node i’s identifier. Subsequently, it computes its two-hop broadcast key T H K i = G ( M K i , R N i | | R N i ) . Node i sends R N i encrypted with K I N to its two-hop neighbors. The latter use the received R N i to derive M K i and T H K i . We assume that an adversary can compromise a node only after T m i n time units from network deployment. Before the expiration of T m i n , each node i erases K I N and R N i from its memory in order to prevent an adversary from compromising the keys of other nodes. Node i uses T H K i to encrypt its observations.
An attacker might forge its identity to masquerade as another node and send fake observations. To allow for two-hop authentication of the observation, each node i generates a two-hop one-way hash chain (TOHC) ( H i 0 , H i 1 , H i 2 , , H i K ) . Each node within i’s two-hop neighborhood is preloaded with the last value ( H i K ). Upon generation of the d’th observation, node i appends ( H i K d ) to R e p i . Each monitoring node that receives the d’th observation can authenticate the source i by applying the one-way hash function on the received value H i K d and verifying whether the result is equal to the pre-loaded TOHC value H i K ( d 1 ) ; F ( H i K d ) = H i K ( d 1 ) .
When a node is physically captured, the adversary can retrieve all of the embedded security credentials and turn the node into a liar that fabricates fake reports, without being detected by the above security mechanisms. In the following subsections, we show how this issue is tackled under two models of selective routing attacks.

5.2.4. First Selective Routing Attack Model

In this model, a malicious node is defined as the one behaving maliciously against all od its upstream neighbors. Let χ w ω u denotes the highest flow drop observed on the link ( ω , u ) by the witness node w during the training phase. If node u is behaving maliciously against upstream neighbor ω , then constraint (C4) applied on link ( ω , u ) will be as follows:
f ( ω , u ) g ( ω , u , P a r e n t u ) > χ w ω u
Proposition 2.
Under the first selective routing attack model, any honest node located in W R u that rates u positively (resp., negatively), the other honest nodes located in W R u must also rate u positively (resp., negatively).
Proof. 
If two witness nodes w and w are monitoring node u, four cases can occurs:
  • C h i l d u [ w ] = C h i l d u [ w ]
  • C h i l d u [ w ] C h i l d u [ w ]
  • ( C h i l d u [ w ] C h i l d u [ w ] ) ( C h i l d u [ w ] C h i l d u [ w ] = Ø )
  • ( C h i l d u [ w ] C h i l d u [ w ] ) ( C h i l d u [ w ] C h i l d u [ w ] Ø )
For all the four cases mentioned above, nodes w and w apply constraint (C4) on node u as follows:
ω C h i l d u [ w ] f ( ω , u ) ω C h i l d u [ w ] g ( ω , u , P a r e n t u ) > ω C h i l d u [ w ] χ w ω u = χ w u
ω C h i l d u [ w ] f ( ω , u ) ω C h i l d u [ w ] g ( ω , u , P a r e n t u ) > ω C h i l d u [ w ] χ w ω u = χ w u
We can notice that both nodes w and w will reach the same opinion about node u’s reputation (i.e., normal or malicious) and, hence, two honest witness nodes rate the same node alike. □
From the above proposition, we can easily prove the following corollary:
Corollary 1.
Under the first selective routing attack model, if two nodes located in W R u are rating u differently, then one of them is liar and the other one is honest.
A captured node can give positive and negative unfair ratings, which might jeopardize the whole reputation system and, thus, efficient protection against unfair rating is a basic requirement. The methods used to filter the ratings can be classified into two groups:
  • Endogenous methods: they exclude unfair ratings by assuming that the ratings provided by honest witnesses are equal or statistically close to each other.
  • Exogenous methods: they exclude unfair ratings by introducing external parameters like the reputation of the witness nodes. They are based on the assumption that the witnesses with low reputation are likely to give unfair ratings.
The exogenous approach is costly in terms of message overhead, as there is a need to collect witness nodes’ reputations from many sources. In the endogenous approach, the monitoring node m needs to get opinions from different M witness nodes about node v, which incurs a communication cost of O ( M ) . On the other hand, exogenous approach require collecting reputation information on each witness node w to decide if w’s opinion will be excluded or not. If we consider that for each witness node, K nodes on average rate w. This leads to an overall complexity of O ( K × M ) . Accordingly, we choose to use the endogenous approach. Node m checks constraint (C3) periodically by performing the following two phases. In the first phase, the monitoring node m compares its own rating about node v with the rating provided by a witness node w about the same node v. If the two ratings are different, w will be excluded from its list of two-hop honest witness nodes H o n e s t m , initialized to be the set of m’s two-hop neighbors. In the second phase, a monitoring node m, by applying constraint (C1) knows exactly how its downstream neighbor P a r e n t m is behaving. If another node w gives a different opinion about P a r e n t m , node m can surely tell that w is a lying and it is excluded from H o n e s t m . At the end of each time period, node m calculates the sum of positive and negative ratings about all its upstream nodes u, denoted by U p s t r e a m P o s i u and U p s t r e a m N e g i u , respectively. As proved above, any two honest witness nodes that are monitoring the same transmitter relay pair ( ω , u ) report the same reputation rating. We assume that, for any upstream node u, the majority of nodes in H o n e s t m W N u are honest. Except for leaf nodes, u : W N u Ø as W u contains u’s upstream nodes. The necessary conditions for node m to correctly rate its upstream node u are the following:
  • There is at least one path with no liar or malicious nodes from each node in ( H o n e s t m W N u ) to the monitoring node m.
  • At least H o n e s t m W N u 2 + 1 nodes in ( H o n e s t m W N u ) are honest.

5.2.5. Second Selective Routing Attack Model

Under this model, a malicious node behaves maliciously against some of its upstream neighbors. Consequently, two honest witness nodes might not make the same judgment. For example, node 13 in Figure 4 can evade detection by behaving maliciously against node 8 but not against node 9. In this case, the witness nodes 7 and 10 will make different observations and, hence, node m cannot judge 13 correctly. If we assume that there is at least one honest node in W i t n e s s i n g m , a monitoring node m can judge its child u only when all nodes in W i t n e s s i n g m report the same rating. Otherwise, node m does not take any decision. Instead, u’s upstream node, which considers u to be malicious by applying constraint (C1), stops routing data through u and switches to another parent node. If node u chooses to continue behaving maliciously against other upstream nodes, it will be isolated by these nodes and have no data to drop.

6. Security Analysis

6.1. Resilience against Some Attacks

In this section, we analyze the security of the two-hop reporting scheme, and discuss its resilience against some potential attacks.
  • Attacks against the key management system: if an adversary overhears exchanged messages during the key establishment phase, only random numbers, which are encrypted with a preloaded initial key, are exchanged among nodes. As the adversary is not preloaded with the initial key, it cannot compute the master keys. Because K I N and R N i are erased before the expiration of T m i n , the capture of one node does not reveal the master keys of other nodes. The adversary can only access the two-hop broadcast keys stored on the capture node.
  • Attacks against the authentication mechanism: one-way hash chain is largely used in authentication. An adversary can only extract the hash chain of the captured node, and hence it cannot generate observations using the identity of other nodes.
  • Attacks using Fabrication: as a node does not have the two-hop broadcast keys of its neighbor, it cannot alter the observations it has to relay to the monitoring node. However, an adversary can make a captured node generate false observations. To deal with this problem, we use the solutions that are presented in Section 5.2.4 and Section 5.2.5.
  • Beacon dropping attack: a malicious node might drop the beacon packets originated from honest nodes. As long as there is one path with only honest and well-behaved nodes, the fair rating will eventually reach the monitoring node.

6.2. Full-Resilience Probability Analysis

In this section, we provide the theoretical analysis of the full-resilience probability of the reputation system against selective routing attacks and unfair ratings.
We assume that N nodes are uniformly distributed in a region of area A. The probability density function (pdf) of the distance S between two nodes with a uniformly distributed node is given by [44]:
f S ( s ) = s ^ 9 π [ 18 π 36 arcsin ( s ^ 2 ) 9 s ^ 4 s ^ 2 ]
where S ^ = S a , and a = A π .
We assume that all of the nodes have the same transmission radio range r. Two nodes establish a link if they are located within a distance of r from each other. The probability that the distance between two nodes is less than or equal to r is given by [45]:
P 1 = P ( S r ) = 0 r f S ( s ) d s
The necessary condition for a monitoring node m to correctly rate node u is W N u Ø , i.e., at least one node must reside in the region R 1 of area A 1 ( d ) , which results from the intersection of two circular communication regions with radius r and centered at u and its child node ω . The distance d between the two nodes u and ω , must be in the range between 0 and r. The area A 1 ( d ) is calculated, as follows:
A 1 ( d ) = 2 r 2 c o s 1 ( d 2 r ) d r 2 d 2 4
The expected area E [ A 1 ] is calculated as follows:
E [ A 1 ] = 0 r f S ( s ) A 1 ( s ) d s
The expected number of witness nodes located in R 1 is N A 1 = E [ A 1 ] N A
A monitoring node m is connected to the witness node w either directly or through a relay node. The relay node must reside in the region R 2 of area A 2 ( d ) , which is resulted from the intersection of two circular communication regions with radius r and centered at m and w. The area A 2 ( d ) is calculated, as follows:
A 2 ( d ) = 2 r 2 c o s 1 ( d 2 r ) d r 2 d 2 4
The expected area E [ A 2 ] is calculated, as follows:
E [ A 2 ] = r 2 r f S ( s ) A 2 ( s ) d s
The expected number of relay nodes located in R 2 is N A 2 = E [ A 2 ] N A
The probability that at least one relay node resides in the region R 2 is given by:
I ( d ) = 1 ( 1 A 2 ( d ) A ) N 2
The connection probability between the two nodes, which communicate in two hops and are separated by a distance d ranging between r and 2 r , is calculated as follows [46]:
P 2 = r 2 r f S ( s ) I ( s ) d s
We consider that a monitoring node can directly communicate with N A 1 1 witness nodes and with N A 1 2 = ( N A 1 N A 1 1 ) witness nodes through relay nodes.
In Figure 5, the witness node w can reach the monitoring node m via the relay nodes u, w 1 , and w 2 . Nodes w 1 and w 2 also witness the traffic transmitted on ( u 1 , u ) and ( u 2 , u ) , respectively.
The average probability that the monitoring node m is connected to all N A 1 witness nodes is given by:
P f u l l c o n = P 1 N A 1 1 P 2 N A 1 2
Let P c o m p be the probability that the node is compromised. The average probability that there is at least one path, which is free from compromised nodes, between one witness node and the monitoring node is:
P s e c = P 1 × ( 1 P c o m p ) o n e h o p P 2 ( 1 P c o m p ) ( 1 P c o m p N A 2 ) t w o h o p
The average probability that there is at least one path, which is free from compromised nodes, between the majority of witness nodes and the monitoring node is:
( k = N A 1 2 + 1 N A 1 C k N A 1 P s e c k ( 1 P s e c ) N A 1 k ) × P f u l l c o n

7. Comparative Analysis: Resiliency against Upstream-Node Effect

In this section, we compare between the relaxed flow conservation constraint, the packet sending rate, and the packet dropping rate with respect to resiliency against the upstream-node effect, as shown in Figure 6. In this comparison analysis, we consider two nodes: M, and P, and M is sending packets to P. We consider the following notations:
  • x is the number of packets dropped by the upstream node M.
  • P F P denotes the number of packets that are forwarded by node P.
  • P R P denotes the number of packets that are received by node P from node M.
Proposition 3.
The packet sending rate feature is not resilient against upstream-node effect.
Proof. 
Node P is considered by a monitoring node O to be legitimate if P R P > T h S R . Otherwise, it is considered as malicious.
A malicious node M drops x packets, and node P only receives and forwards P R P x packets accordingly. Thus, the packet sending rate observed at node P is ( P R P x ). We will prove Proposition 3 by contradiction: let us assume that node P is always considered by a monitoring node as legitimate. Formally,
x : P R P x > T h S R
From (1), it follows that: x : f S R ( x ) = P R P x T h S R > 0 . As shown in Figure 6a, x : f S R ( x ) 0 , which contradicts Assumption 1. Hence, for some values of x, node P is considered by a monitoring node as malicious. Therefore, the packet sending rate feature cannot prevent the upstream-node effect. □
Proposition 4.
The packet dropping rate feature is not resilient against upstream-node effect.
Proof. 
Node P is considered by a monitoring node O as legitimate if ( 1 P F P P R P ) T h D R . Otherwise, it is considered to be malicious.
A malicious node M drops x packets, and node P only receives and forwards P R P x packets accordingly. Thus, the packet dropping rate observed at node P is ( 1 ( P F P x P R P x ) ) . We will prove Proposition 4 by contradiction: let us assume that node P is always considered by a monitoring node as legitimate. Formally,
x : ( 1 ( P F P x P R P x ) ) T h D R
From (2), it follows that: x : f D R ( x ) = ( 1 ( P F P x P R P x ) T h D R ) 0 . As shown in Figure 6b, x : f D R ( x ) > 0 , which contradicts Equation (2). Hence, for some values of x, node P is considered by a monitoring node as malicious. Therefore, the packet dropping rate feature cannot prevent the upstream-node effect. □
Proposition 5.
The relaxed flow conservation feature is resilient against upstream-node effect.
Proof. 
Node P is considered by a monitoring node O as legitimate if ( P R P P F P ) T h R F . Otherwise, it is considered as malicious.
A malicious node M drops x packets, and node P only receives and forwards P R P x packets accordingly. Thus, the relaxed flow conservation feature observed at node P is ( P R P P F P x ) . We check whether the following statement is correct:
x : ( P R P P F P x ) T h R F
From (3), it follows that: x : f R F ( x ) = ( P R P P F P x T h R F ) 0 , as shown in Figure 6c, and which proves Proposition 5. Hence, P is always considered by a monitoring node as legitimate. □

8. Performance Analysis

8.1. Complexity Analysis

In this section, we analyze the performance of the proposed intrusion detection system against selective routing attacks. The performance is studied under the following metrics: communication complexity and message complexity, which are defined as follows:
  • Communication complexity (CC): The number of one-hop transmission each node needs to perform initially and periodically.
  • Message complexity (MC): The size in terms of bits of control information transmitted by each node initially and periodically.
The complexity results are summarized in Table 1. Initially, each node i broadcasts W i t n e s s e d i with T T L = 2 , i.e., the messages are broadcast by i and its neighbors. This operation leads to a communication complexity of O ( d m a x + 1 ) , where d m a x is the maximum node degree of the network. The same complexity is incurred by sending R N i . By adding the broadcast operation of W i t n e s s i n g i , the total communication cost becomes proportional to O ( 2 d m a x + 3 ) per node. Let R N and T C be the size of R N i and TOHC value, respectively. As the size of W i t n e s s e d i and W i t n e s s i n g i is O ( d m a x log 2 N ) , the message complexity in the initialization phase is O ( ( d m a x 2 + 2 d m a x ) log 2 N + ( d m a x + 1 ) R N ) . The proposed IDS does not cause any additional packets during the periodic step, but it piggybacks some control information to the beacon packet. During the time period of ( | R e l a y i | + 2 ) slots, each node i relays the ratings of its neighbors in R e l a y i and its two own ratings. The periodic message complexity is O ( d m a x + log 2 N ) , as explained in Section 5.2.2. In addition, the TOHC value is appended to each observation.

8.2. Energy Dissipation and Node Lifetime Analysis

We use the radio energy model, as that in [47]. The energy dissipation of transmitting (resp., receiving) one bit of information is given by: E T x = E e l e c + E a m p × D i s α (resp., E R x = E e l e c ), where: D i s is the distance separating two nodes, and α is the attenuation factor of the environment and can be between 2 for free space and 4 for urban environment. The parameters that are used in [47] are as follows: E e l e c = 50 n J / b i t , E a m p = 100 p J / b i t / m 2 . Let D _ P k t and B _ P k t be the size in bit of data packet and beacon packet sent at each time period T B , respectively. The tree-based routing protocol with and without the proposed IDS is symmetric in the sense that every node executes the same code, i.e., every time that a node sends a message, it has to receive the same type of message from each neighbor node. Subsequently, the energy dissipated by a node under a tree-based routing protocol is:
E W = ( D _ P k t + B _ P k t ) ( E T x + d m a x E R x )
In the case of the same routing protocol with the proposed IDS, the energy dissipated by a node is composed of two terms: The first term is the energy dissipated during the initialization phase, and it is computed as:
E I D S a = ( ( d m a x 2 + 2 d m a x ) log 2 N + ( d m a x + 1 ) R N ) ( E T x + d m a x E R x )
The second term, which is consumed periodically at each T B , is computed as:
E I D S b = ( D _ P k t + B _ P k t + d m a x + log 2 N + T C ) ( E T x + d m a x E R x )
Let the energy initial of each node be E i n i t . The node lifetime under the tree-based protocol is
T W = ( E i n i t E w ) × T B
The node lifetime under the IDS is:
T I D S = ( E i n i t E I D S a E I D S b ) × T B
Let N = 1024 , d m a x = 10 , R N = 32 , T C = 32 , and α = 2 . For the rest of parameters, we use the following, as in [48]: D _ P k t = 4000 bytes, B _ P k t = 20 bytes, D i s = 50 m, and E i n i t = 3 J. Therefore, we obtain: E W = 25.728 m J , E I D S a = 1.241 m J , E I D S b = 25.769 m J , T W = 116.60 × T B , and T I D S = 116.37 × T B .

9. Simulation Results

In this section, we study the performance of the proposed intrusion detection system against selective routing attacks using GloMoSim simulator [49]. In our simulation scenarios, each malicious node launches a selective routing attack with probability P for each packet that it receives. To simulate a lossy wireless channel, we assume the Two-Ray path loss propagation model. In this model, the received power P r is modelled as: P r = P t G t G r h t 2 h r 2 D 4 where: P t is the transmission power. G t and G r are antenna gains of transmitter and receiver respectively. h t and h r are the heights of both antennas. D is the distance between the transmitter and the receiver. The packet reception model is based on the signal to noise ratio (SNR) threshold. When the SNR is larger than a defined threshold, the signal is received without errors. Otherwise, the packet is dropped. The simulation parameters and their values are shown in Table 2. We generate the topology of the network using the NetLogo library [50], as shown in Figure 7.
Each node generates ten packets/second towards the sink, and each monitoring period lasts for 10 s. After a training phase of T time periods, testing phase lasts for 1800 s. The role of the IDS, which is implemented at each node i, is not just to detect if i’s neighbor (e.g., node j) is malicious or not, but also to know whether node j is malicious during a given time period. The dataset that is produced from the simulation can be found in [51]. We evaluate the performance of the IDS using the following six metrics:
A c c u r a c y = T P + T N T P + T N + F P + F N
P r e c i s i o n = T P T P + F P
R e c a l l = T P T P + F N
F s c o r e = 2 ( P r e c i s i o n × R e c a l l ) P r e c i s i o n + R e c a l l
F a l s e   p o s i t i v e   r a t e = T P T P + F N
F a l s e   n e g a t i v e   r a t e = F N T P + F N
where T P , T N , F P , and F N denote the true positives, true negatives, false positives, and false negatives, respectively.
Figure 8a shows the values of N L o w that are observed by a given node in the network while monitoring one of its neighbors. At lower training periods, N L o w = 99 and it stabilizes at 98 starting from T = 30 . Figure 8b–e show the recall, precision, accuracy, and F-score of the proposed IDS, respectively, as a function of dropping probability. The first observation we can draw from the figure is that the recall is 100% when the dropping probability is higher than 0.05, and it is under 100% when the dropping probability becomes 0.02 and 0.01. This can be explained, as follows: under very low dropping probabilities, the malicious nodes perform at low intensities and their activities become unnoticeable. This happens when it is difficult to distinguish between packet loss due to normal activities and packet drop attack, and we can notice this when the dropping probability becomes very close or less than the normal packet loss, which is, at most, 2 % during each time period. The same observation can be made from Figure 8c–e. However, they record lower results compared to recall results due to the effect of false positives. Figure 8f–h show the recall, false negative rate, and false positive rate of the IDS, respectively, as a function of the training period. The results are presented under the following levels of dropping probability P = 1 , 0.5 , 0.1 , 0.05 , 0.01 . Under high dropping probabilities, the recall (resp., false negative rate) is 100 % (resp., 0 % ) for all of the training periods. Under low dropping probabilities, the detection rate decreases as the malicious behavior becomes very close to the normal one. We can notice that the false positive rate becomes 0 when the training period T reaches 30 in certain cases and 40 in others. At these values of the training period, N L o w * is observed and the IDS can accurately distinguish between normal traffic and selective routing attack. For instance, when the dropping probability is 0.5, the false positive rate becomes 0 at T = 30 . Before N L o w * is observed (i.e., T < 30 or T < 40 ), the false positive rate curves are random, as they depend on the number of times the monitored profile is observed inside the interval [ N L o w * , N L o w ] , which itself depends on the probability of packet loss.

10. Conclusions

In this paper, we have proposed an intrusion detection system against selective routing attack in wireless sensor networks. To counter a novel threat, named upstream-node effect, the proposed IDS employs a one-dimensional one-class classifier, named relaxed flow conservation constraint. We have derived four path-free features from the relaxed flow conservation constraint, in order to monitor all its neighbors. Three features can be obtained directly using one-hop information and the fourth one is obtained using the proposed two-hop energy-efficient and secure reporting scheme. We have analyzed the security of the proposed IDS and its resilience probability against the selective routing attacks and unfair ratings. We have also provided a performance complexity of the IDS and a comparison between the relaxed flow conservation and other features. The node lifetime analysis demonstrates that the energy consumption incurred by the IDS is insignificant. The simulation results show that the proposed intrusion detection system achieves good results in terms of detection effectiveness. It can achieve a recall of 100 % when the dropping probability is higher than the normal packet loss rate, and it can also achieve a false positive rate of 0 % when N L o w * is observed during the training phase. As a future work, we plan to relax some assumptions and consider different transmission rates. Additionally, it would be interesting to integrate the blockchain technology with the proposed scheme.

Author Contributions

Conceptualization, A.D. and A.B.; Methodology, A.D. and A.B.; Software, A.D. and M.B.; Validation, A.D. and M.B.; formal analysis, A.D.; investigation, A.D. and A.B.; resources, A.D. and A.B.; data curation, A.D. and A.B.; writing—original draft preparation, A.D., A.B., M.B., L.M.; writing—review and editing, F.A.K.; visualization, A.D., A.B., M.B., and F.A.K.; project administration, A.D.; funding acquisition, A.D. All authors have read and agreed to the published version of the manuscript.

Funding

This work is funded by the Deanship of Scientific Research at King Saud University through research group No (RG-1439-021).

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research group No (RG-1439-021).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks: A survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef] [Green Version]
  2. Becher, A.; Benenson, Z.; Dornseif, M. Tampering with motes: Real-world physical attacks on wireless sensor networks. In Proceedings of the Third international Conference on Security in Pervasive Computing (SPC’06), York, UK, 18–21 April 2006; pp. 104–118. [Google Scholar]
  3. Ahmed, A.; Latif, R.; Latif, S.; Abbas, H.; Khan, F.A. Malicious insiders attack in IoT based multi-cloud e-healthcare environment: A systematic literature review. Multimed. Tools Appl. 2018, 77, 21947–21965. [Google Scholar] [CrossRef]
  4. Ali, A.; Khan, F.A. A broadcast-based key agreement scheme using set reconciliation for wireless body area networks. J. Med. Syst. 2014, 38, 33. [Google Scholar] [CrossRef] [PubMed]
  5. Derhab, A.; Belaoued, M.; Guerroumi, M.; Khan, F.A. Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing. IEEE Access 2020, 8, 28956–28969. [Google Scholar] [CrossRef]
  6. Derhab, A.; Bouras, A.; Senouci, M.R.; Imran, M. Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 10, 608162. [Google Scholar] [CrossRef]
  7. Derhab, A.; Bouras, A. Lightweight Anomaly-based Intrusion Detection System for Multi-feature Traffic in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Netw. 2016, 30, 201–217. [Google Scholar]
  8. Imran, M.; Durad, M.H.; Khan, F.A.; Derhab, A. Toward an optimal solution against denial of service attacks in software defined networks. Future Gener. Comput. Syst. 2019, 92, 444–453. [Google Scholar] [CrossRef]
  9. Derhab, A.; Guerroumi, M.; Gumaei, A.; Maglaras, L.; Ferrag, M.A.; Mukherjee, M.; Khan, F.A. Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security. Sensors 2019, 19, 3119. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Ioannis, K.; Dimitriou, T.; Freiling, F.C. Towards intrusion detection in wireless sensor networks. In Proceedings of the 13th European Wireless Conference, Paris, France, 1–4 April 2007; pp. 1–7. [Google Scholar]
  11. da Silva, A.P.R.; Martins, M.H.T.; Rocha, B.P.S.; Loureiro, A.A.F.; Ruiz, L.B.; Wong, H.C. Decentralized intrusion detection in wireless sensor networks. In Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks (Q2SWinet’05), Montreal, QC, Canada, 13 October 2005; pp. 16–23. [Google Scholar]
  12. Stetsko, A.; Folkman, L.; Matyas, V. Neighbor-based intrusion detection for wireless sensor networks. In Proceedings of the 6th International Conference on Wireless and Mobile Communications (ICWMC), Valencia, Spain, 20–25 September 2010; pp. 420–425. [Google Scholar]
  13. Yu, B.; Xiao, B. Detecting selective forwarding attacks in wireless sensor networks. In Proceedings of the 20th International on Parallel and Distributed Processing Symposium (IPDPS 2006), Rhodes Island, Greece, 25–29 April 2006. [Google Scholar]
  14. Kaplantzis, S.; Shilton, A.; Mani, N.; Sekercioglu, Y. Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines. In Proceedings of the 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, (ISSNIP 2007), Melbourne, Australia, 3–6 December 2007; pp. 335–340. [Google Scholar]
  15. Wang, X.-S.; Zhan, Y.-Z.; Xiong, S.-M.; Wang, L.-M. Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. In Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC ’09), Zhangjiajie, China, 10–11 October 2009; pp. 226–232. [Google Scholar]
  16. Brown, J.; Du, X. Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks. In Proceedings of the IEEE International Conference on Communications (ICC ’08), Beijing, China, 19–23 May 2008; pp. 1583–1587. [Google Scholar]
  17. Xiao, B.; Yu, B.; Gao, C. CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput. 2007, 67, 1218–1230. [Google Scholar] [CrossRef]
  18. Li, G.; Liu, X.; Wang, C. A sequential mesh test based selective forwarding attack detection scheme in wireless sensor networks. In Proceedings of the International Conference on Networking, Sensing and Control (ICNSC), Chicago, IL, USA, 10–12 April 2010; pp. 554–558. [Google Scholar]
  19. Reddy, Y.B.; Srivathsan, S. Game theory model for selective forward attacks in wireless sensor networks. In Proceedings of the 2009 17th Mediterranean Conference on Control and Automation, Thessaloniki, Greece, 24–26 June 2009; pp. 458–463. [Google Scholar]
  20. Deng, H.; Sun, X.; Wang, B.; Cao, Y. Selective forwarding attack detection using watermark in WSNs. In Proceedings of the ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM 2009), Sanya, China, 8–9 August 2009; Volume 3, pp. 109–113. [Google Scholar]
  21. yin Zhang, D.; Xu, C.; Siyuan, L. Detecting selective forwarding attacks in WSNs using watermark. In Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, 9–11 November 2011; pp. 1–4. [Google Scholar]
  22. Mukherjee, S.; Chattopadhyay, M.; Chattopadhyay, S.; Bose, P.; Bakshi, A. Detection of selective forwarding attack in wireless ad hoc networks using binary search. In Proceedings of the Third International Conference on Emerging Applications of Information Technology (EAIT), Kolkata, India, 30 November–1 December 2012; pp. 382–386. [Google Scholar]
  23. Onat, I.; Miri, A. An intrusion detection system for wireless sensor networks. In Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’2005), Montreal, QC, Canada, 22–24 August 2005; Volume 3, pp. 253–259. [Google Scholar]
  24. Bagaa, M.; Derhab, A.; Lasla, N.; Ouadjaout, A.; Badache, N. Semi-structured and unstructured data aggregation scheduling in wireless sensor networks. In Proceedings of the 2012 IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2671–2675. [Google Scholar]
  25. Bagaa, M.; Younis, M.; Derhab, A.; Badache, N. Intertwined path formation and MAC scheduling for fast delivery of aggregated data in WSN. Comput. Netw. 2014, 75, 331–350. [Google Scholar] [CrossRef]
  26. Bagaa, M.; Younis, M.; Djenouri, D.; Derhab, A.; Badache, N. Distributed low-latency data aggregation scheduling in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 2015, 11, 1–36. [Google Scholar] [CrossRef]
  27. Wang, Y.; Wong, J.; Miner, A. Anomaly intrusion detection using one class SVM. In Proceedings of the Fifth Annual IEEE SMC Information Assurance Workshop, West Point, NY, USA, 10–11 June 2004; pp. 358–364. [Google Scholar]
  28. Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA, 11 May 2003; pp. 113–127. [Google Scholar]
  29. Xiao-long, P.; Zhang-geng, Y.; Shi-song, M.; Ying-shan, Z.; Yan, L. The sequential mesh test for a proportion. J. East China Norm. Univ. 2006, 1, 63–71. [Google Scholar]
  30. Jamshidi, M.; Esnaashari, M.; Ghasemi, S.; Qader, N.N.; Meybodi, M.R. DSLA: Defending against Selective Forwarding Attack in Wireless Sensor Networks using Learning Automaton. IEIE Trans. Smart Process. Comput. 2020, 9, 58–74. [Google Scholar] [CrossRef]
  31. Fu, H.; Liu, Y.; Dong, Z.; Wu, Y. A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks. Sensors 2020, 20, 23. [Google Scholar] [CrossRef] [Green Version]
  32. Mehetre, D.C.; Roslin, S.E.; Wagh, S.J. Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Clust. Comput. 2019, 22, 1313–1328. [Google Scholar] [CrossRef]
  33. Palpanas, T.; Papadopoulos, D.; Kalogeraki, V.; Gunopulos, D. Distributed deviation detection in sensor networks. SIGMOD Rec. 2003, 32, 77–82. [Google Scholar] [CrossRef]
  34. Subramaniam, S.; Palpanas, T.; Papadopoulos, D.; Kalogeraki, V.; Gunopulos, D. Online outlier detection in sensor data using non-parametric models. In Proceedings of the 32nd International Conference on Very Large Data Bases, Seoul, Korea, 12–15 September 2006; pp. 187–198. [Google Scholar]
  35. Khan, S.S.; Madden, M.G. A survey of recent trends in one class classification. In Proceedings of the 20th Irish Conference on Artificial Intelligence and Cognitive Science (AICS’09), Dublin, Ireland, 19–21 August 2009; pp. 188–197. [Google Scholar]
  36. Tax, D.M.J.; Juszczak, P. Kernel Whitening for One-Class Classification. In Proceedings of the First International Workshop on Pattern Recognition with Support Vector Machines (SVM’02), Niagara Falls, Canada, ON, 10 August 2002; pp. 40–52. [Google Scholar]
  37. Lin, S.; Zhou, G.; Whitehouse, K.; Wu, Y.; Stankovic, J.A.; He, T. Towards Stable Network Performance in Wireless Sensor Networks. In Proceedings of the IEEE Real-Time Systems Symposium (RTSS), Washington, DC, USA, 1–4 December 2009; pp. 227–237. [Google Scholar]
  38. Burri, N.; von Rickenbach, P.; Wattenhofer, R. Dozer: Ultra-low power data gathering in sensor network. In Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN), Cambridge, MA, USA, 25–27 April 2007; pp. 450–459. [Google Scholar]
  39. Musaloiu-E, R.; Liang, C.J.M.; Terzis, A. Koala: Ultra-Low Power Data Retrieval in Wireless Sensor Networks. In Proceedings of the 7th international Conference on information Processing in Sensor Networks (IPSN), St. Louis, MO, USA, 22–24 April 2008; pp. 421–432. [Google Scholar]
  40. Colesanti, U.M.; Santiniy, S.; Vitaletti, A. Dissense: An adaptive ultralow-power communication protocol for wireless sensor networks. In Proceedings of the 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2011), Barcelona, Spain, 27–29 June 2011; pp. 1–10. [Google Scholar]
  41. Matsuoka, Y.; Fujishige, S. Practical Efficiency of Maximum Flow Algorithms Using MA Orderings and Preflows. J. Oper. Res. Soc. Jpn. 2005, 48, 297–307. [Google Scholar] [CrossRef] [Green Version]
  42. Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 3rd ed.; MIT Press: Cambridge, MA, USA, 2009. [Google Scholar]
  43. Lasla, N.; Derhab, A.; Ouadjaout, A.; Bagaa, M.; Challal, Y. SMART: Secure Multi-pAths Routing for wireless sensor neTworks. In Proceedings of the 13th International Conference on Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW), Benidorm, Spain, 22–27 June 2014; pp. 332–345. [Google Scholar]
  44. Bettstetter, C. Topology Properties of Ad Hoc Networks with Random Waypoint Mobility. ACM Sigmobile Mob. Comput. Commun. Rev. 2003, 7, 50–52. [Google Scholar] [CrossRef]
  45. Farhadi, G.; Beaulieu, N.C. On the Connectivity and Average Delay of Mobile Ad Hoc Networks. In Proceedings of the IEEE International Conference on Communications (ICC 2006), Istanbul, Turkey, 11–15 June 2006; pp. 3868–3872. [Google Scholar]
  46. Vellore, P.; Gillard, P.; Venkatesan, R. Probability Distribution of Multi-Hop Multipath connection in a Random Network. In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, HI, USA, 30 November–4 December 2009; pp. 1–5. [Google Scholar]
  47. Heinzelman, W.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocols for wireless microsensor networks. In Proceedings of the Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000. [Google Scholar]
  48. Qiu, M.; Ming, Z.; Li, J.; Liu, J.; Quan, G.; Zhu, Y. Informer homed routing fault tolerance mechanism for wireless sensor networks. J. Syst. Archit. 2013, 59, 260–270. [Google Scholar] [CrossRef]
  49. Zeng, X.; Bagrodia, R.; Gerla, M. GloMoSim: A library for parallel simulation of large-scale wireless networks. In Proceedings of the 12th Workshop on Parallel and Distributed Simulation (PADS), Banff, AB, Canada, 29 May 1998; pp. 154–161. [Google Scholar]
  50. Sakellariou, I. An Attempt to Simulate FIPA ACL Message Passing in NetLogo. 2010. Available online: http://users.uom.gr/~iliass/projects/NetLogo/FIPA_ACL_MessagesInNetLogo.pdf (accessed on 19 October 2020).
  51. Two-Hop IDS WSN Dataset. Available online: https://fac.ksu.edu.sa/abderhab/announcement/333117 (accessed on 19 October 2020).
Figure 1. Impact of upstream-node effect on false positive rate: (a) normal sending rate, (b) sending rate under packet dropping attack.
Figure 1. Impact of upstream-node effect on false positive rate: (a) normal sending rate, (b) sending rate under packet dropping attack.
Sensors 20 06106 g001
Figure 2. Flow conservation constraint.
Figure 2. Flow conservation constraint.
Sensors 20 06106 g002
Figure 3. Witness region for ( u 1 , u ) and total witness region for u.
Figure 3. Witness region for ( u 1 , u ) and total witness region for u.
Sensors 20 06106 g003
Figure 4. Initialization and rating phases.
Figure 4. Initialization and rating phases.
Sensors 20 06106 g004
Figure 5. Communication between witness and monitoring nodes.
Figure 5. Communication between witness and monitoring nodes.
Sensors 20 06106 g005
Figure 6. Resiliency against upstream-node effect.
Figure 6. Resiliency against upstream-node effect.
Sensors 20 06106 g006
Figure 7. Network topology.
Figure 7. Network topology.
Sensors 20 06106 g007
Figure 8. Performance of the proposed IDS.
Figure 8. Performance of the proposed IDS.
Sensors 20 06106 g008
Table 1. Complexity analysis of the proposed IDS.
Table 1. Complexity analysis of the proposed IDS.
CC (Initial) O ( 2 d m a x + 3 )
CC (Periodic)0
MC (Initial) O ( ( d m a x 2 + 2 d m a x ) log 2 N + ( d m a x + 1 ) R N )
MC (Periodic) O ( d m a x + log 2 N + T C )
Table 2. Simulation Parameters.
Table 2. Simulation Parameters.
ParametersValues
Number of nodes50
Dropping probability1, 0.8, 0.5, 0.2, 0.1, 0.05, 0.04, 0.03, 0.02, 0.01
Monitoring period ( Δ )10 s
Training period (T)3, 5, 10, 20, 30, 40, 50 × Δ
Transmission power ( P t )5 dBm
G t , G r 0 db
h t , h r 1.5 m
SNR Threshold10 db
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Derhab, A.; Bouras, A.; Belaoued, M.; Maglaras, L.; Khan, F.A. Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors 2020, 20, 6106. https://doi.org/10.3390/s20216106

AMA Style

Derhab A, Bouras A, Belaoued M, Maglaras L, Khan FA. Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors. 2020; 20(21):6106. https://doi.org/10.3390/s20216106

Chicago/Turabian Style

Derhab, Abdelouahid, Abdelghani Bouras, Mohamed Belaoued, Leandros Maglaras, and Farrukh Aslam Khan. 2020. "Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks" Sensors 20, no. 21: 6106. https://doi.org/10.3390/s20216106

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop