2020
DOI: 10.3390/s20216106
|View full text |Cite
|
Sign up to set email alerts
|

Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks

Abstract: In this paper, we investigate the problem of selective routing attack in wireless sensor networks by considering a novel threat, named the upstream-node effect, which limits the accuracy of the monitoring functions in deciding whether a monitored node is legitimate or malicious. To address this limitation, we propose a one-dimensional one-class classifier, named relaxed flow conservation constraint, as an intrusion detection scheme to counter the upstream node attack. Each node uses four types of relaxed flow … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…For instance, although wired sensors are efficient, they are expensive and difficult to manipulate in terms of installation, particularly for wide geographic distributions. On the contrary, wireless sensors may be easier to use but are subject to distortion due to environmental conditions and the presence of a higher level of electromagnetic disturbance, and are more vulnerable to cyber-attacks than wired sensors [53,54]. In addition, drone sensors, such as those found on Unmanned Aerial Vehicles (UAVs), are unstable.…”
Section: Technologiesof Detection Sensorsmentioning
confidence: 99%
“…For instance, although wired sensors are efficient, they are expensive and difficult to manipulate in terms of installation, particularly for wide geographic distributions. On the contrary, wireless sensors may be easier to use but are subject to distortion due to environmental conditions and the presence of a higher level of electromagnetic disturbance, and are more vulnerable to cyber-attacks than wired sensors [53,54]. In addition, drone sensors, such as those found on Unmanned Aerial Vehicles (UAVs), are unstable.…”
Section: Technologiesof Detection Sensorsmentioning
confidence: 99%
“…Although the reputation approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] relying on the watchdog approach permit to punish malicious nodes that drop data packets, they are not able to thwart selective dropping attack [21]. Almost of these approaches are vulnerable to two mains security threats:…”
Section: Introductionmentioning
confidence: 99%
“…Although the reputation approaches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20] relying on the watchdog approach permit to punish malicious nodes that drop data packets, they are not able to thwart selective dropping attack [21]. Almost of these approaches are vulnerable to two mains security threats:…”
Section: Introductionmentioning
confidence: 99%