2021
DOI: 10.1109/access.2021.3083105
|View full text |Cite
|
Sign up to set email alerts
|

Employ DBSCAN and Neighbor Voting to Screen Selective Forwarding Attack Under Variable Environment in Event-Driven Wireless Sensor Networks

Abstract: In the event-driven wireless sensor networks (EWSNs), the event of interests occurs irregularly and at random in the network. Then, sensor nodes near the event sense the event and send out data packets of the event. Next, router nodes (RNs) forward those packets to the sink node (SN) by multi-hop communications. Compromised RNs would become malicious and launch selective forwarding attacks by dropping part of or all the packets from other nodes. On the other hand, a harsh environment makes the channel poor, so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(2 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…As the event of interest occurs and a new round begins, and the event node driven by EoI establishes the route. ENs establishes the route according to the voting method of neighbor nodes represented by [13], and looks for a reliable node closer to SN as the next hop node. When the network runs to the k-th round, malicious node detection begins, and k is called the detection period.…”
Section: Data Setmentioning
confidence: 99%
“…As the event of interest occurs and a new round begins, and the event node driven by EoI establishes the route. ENs establishes the route according to the voting method of neighbor nodes represented by [13], and looks for a reliable node closer to SN as the next hop node. When the network runs to the k-th round, malicious node detection begins, and k is called the detection period.…”
Section: Data Setmentioning
confidence: 99%
“…The study integrates blockchain-based technology with data transfer to build a highly secure WSN structure. Meanwhile, Liu and Wu [22] conducted research to withstand attacks related to fragments of data packet delivery on nodes that are vulnerable to security. Research developed a combined scheme to detect selective forwarding attacks in wireless sensor networks (WSN) under chaotic (HARS) environments.…”
Section: Wsn Security Systemsmentioning
confidence: 99%