2016
DOI: 10.1587/transinf.2015inp0005
|View full text |Cite
|
Sign up to set email alerts
|

MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs

Abstract: SUMMARYIn this paper, a multi-data and multi-ACK verified selective forwarding attacks (SFAs) detection scheme is proposed for containing SFAs. In our scheme, each node (in addition to the nodes in the hotspots area) generates multiple acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. In multiple ACK message, one ACK is returned along the data forwarding path, other ACKs are returned along different routing paths, and thus malicious nodes can be located accuratel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Much research has been conducted on the secure routing schemes of wireless sensor networks. This section is divided into the following 3 parts to introduce the works related to this paper: (1) schemes and approaches related to secure routing [ 30 , 31 , 32 , 33 , 34 , 35 , 45 , 46 ]; (2) routing schemes related to traceback [ 47 , 48 , 49 ]; (3) energy consumption features of Energy-Harvesting Wireless Sensor Networks (EHWSNs) and management-related schemes [ 20 , 21 , 22 , 23 , 24 , 25 , 26 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Much research has been conducted on the secure routing schemes of wireless sensor networks. This section is divided into the following 3 parts to introduce the works related to this paper: (1) schemes and approaches related to secure routing [ 30 , 31 , 32 , 33 , 34 , 35 , 45 , 46 ]; (2) routing schemes related to traceback [ 47 , 48 , 49 ]; (3) energy consumption features of Energy-Harvesting Wireless Sensor Networks (EHWSNs) and management-related schemes [ 20 , 21 , 22 , 23 , 24 , 25 , 26 ].…”
Section: Related Workmentioning
confidence: 99%
“…Existing research shows that over 30 types of blocking communication attack behaviors or strategies have been found for wireless sensor networks. These attack behaviors primarily include black attack [ 30 , 31 ], clone attack [ 32 ], Dos attack [ 30 , 31 ], selective forwarding attack [ 33 , 34 , 35 ] and false data injection attack [ 34 ]. These attacks can not only block network communication but also consume the energy of limited sensor nodes, causing the earlier death of the network [ 36 ].…”
Section: Introductionmentioning
confidence: 99%
“…As one of the key components of Cyber-Physical Systems [1][2][3][4], Wireless Sensor Networks (WSNs) are emerging as a promising platform which enable a wide range of applications in both military and civilian domains [5][6][7][8][9][10][11]. Specifically, Industrial Wireless Sensor Networks (IWSNs) are regarded as a promising paradigm for smart industrial automation [12,13].…”
Section: Introductionmentioning
confidence: 99%
“…WSNs are organized networks composed of some tiny sensor nodes that can perform information collection, processing and wireless transmission actions. Due to the large number of nodes in WSNs, a large amount of data needs to be collected [4,5,6], and these data also need to be transmitted, which leads to the problem of spectral tension and node limitations. In order to solve these problems, Cognitive Radio Sensor Networks (CRSNs) have become a research hotspot of many scholars at home and abroad.…”
Section: Introductionmentioning
confidence: 99%