2019
DOI: 10.3390/s20010023
|View full text |Cite
|
Sign up to set email alerts
|

A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks

Abstract: In cluster-based wireless sensor networks, cluster heads (CHs) gather and fuse data packets from sensor nodes; then, they forward fused packets to the sink node (SN). This helps wireless sensor networks balance energy effectively and efficiently to prolong their lifetime. However, cluster-based WSNs are vulnerable to selective forwarding attacks. Compromised CHs would become malicious and launch selective forwarding attacks in which they drop part of or all the packets from other nodes. In this paper, a data c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(26 citation statements)
references
References 33 publications
(55 reference statements)
0
23
0
1
Order By: Relevance
“…The time complexity of ordinary DPC is O (n 2 ) [24]. n is the total number of points in the data set.…”
Section: ) Complexity Analysis Of Nb-dpcmentioning
confidence: 99%
See 1 more Smart Citation
“…The time complexity of ordinary DPC is O (n 2 ) [24]. n is the total number of points in the data set.…”
Section: ) Complexity Analysis Of Nb-dpcmentioning
confidence: 99%
“…When DBSCAN is applied to detecting malicious nodes, these two parameters need to be determined according to the actual state of the clustered WSN, and they need to be adjusted according to the changes of the network. Fu et al [24] proposed a Dynamic Parameter-DBSCAN (DP-DBSCAN) scheme based on DBSCAN for resisting selective forwarding attack. In DP-DBSCAN, the parameters (Eps, MinPts) change depending on the network scenarios to offer better reliability in changing situations [25].…”
Section: Introductionmentioning
confidence: 99%
“…H.Fu et al [19] proposed a selective forwarding attack detection scheme under the data clustering algorithm. The inspector nodes send the cumulative forwarding rate of the cluster heads to the sink node.…”
Section: Related Workmentioning
confidence: 99%
“…Jamshidi et al [30] proposed a distributed lightweight method based on learning automata in order to select the most secure routes for forwarding packets, and thus avoiding those that contain malicious nodes. Fu et al [31] proposed data clustering algorithm to detect and isolate malicious cluster heads that launch selective routing attacks. Mehetre et al [32] introduced a trustable secure routing method for clustered WSNs that can also offer security through encryption and verification of packets on each source node.…”
Section: Intrusion Detection Schemes For Selective Routing Attacksmentioning
confidence: 99%