2014
DOI: 10.4236/wsn.2014.611023
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN

Abstract: The security problems of wireless sensor networks (WSN) have attracted people's wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can't be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…More nodes lay near the SN (at the center) because they have to forward more data packets from nodes far from the SN in the multi-hop WSNs. Figure 15 is the simulation result with the energy consumption module [44] in wireless communication. DCA-SF offers the WSN a much longer lifetime than the IN monitoring scheme.…”
Section: Detection Results Compared With Other Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…More nodes lay near the SN (at the center) because they have to forward more data packets from nodes far from the SN in the multi-hop WSNs. Figure 15 is the simulation result with the energy consumption module [44] in wireless communication. DCA-SF offers the WSN a much longer lifetime than the IN monitoring scheme.…”
Section: Detection Results Compared With Other Schemesmentioning
confidence: 99%
“…We plan to employ DPC and SNN-DPC to cluster the data set in SN for testing their effects. Figure 15 is the simulation result with the energy consumption module [44] in wireless communication.…”
Section: Discussionmentioning
confidence: 99%
“…Insider attack have received attention from researchers such as in [83] the authors proposed a mechanism that manages the network using a node, which monitor the network constantly. The proposed algorithm works by maintaining a dynamic threshold.…”
Section: Existing Solution and Discussionmentioning
confidence: 99%
“…Therefore, the RSSI ranging described in section 'Shortening the network lifespan' is also use to detect suspicious nodes when Sybil attackers launch selective forwarding. The adaptive threshold model [9] is introduced to determine suspicious nodes as Sybil nodes if the trust value T of a suspicious node is low than the trust threshold. The trust value T [10] of a node is shown in equation 1 and the threshold of trust value is defined as equation 2.…”
Section: Selective Forwardingmentioning
confidence: 99%