
A SOLUTION TO SELECTIVE FORWARD ATTACK IN WIRELESS SENSOR NETWORK
Author(s) -
Gulbir Singh,
Om Prakash Dubey,
Gautam Kumar
Publication year - 2018
Publication title -
international journal of students research in technology and management
Language(s) - English
Resource type - Journals
ISSN - 2321-2543
DOI - 10.18510/ijsrtm.2018.625
Subject(s) - computer network , computer science , packet drop attack , network packet , packet forwarding , wireless sensor network , node (physics) , overhead (engineering) , sybil attack , wireless network , wireless , routing protocol , engineering , telecommunications , link state routing protocol , structural engineering , operating system
Purpose of Study: Wireless mesh network represents a solution to provide wireless connectivity. There are some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on a selective forwarding attack. Selective Forwarding Attack is one of the many security threats in wireless sensor networks that can degrade network performance. An adversary on the transmission path selectively drops the packet. The adversary same time transfers the packet, while on a few occasions it drops the packet. It is dicult to detect this type of attack since the packet loss may be due to unreliable wireless communication. The proposed scheme is based on the trust value of each node. During data transmission, a node selects a downstream node that has the highest trust value, which is updated dynamically based on the number of packets a node has forwarded and dropped.
Methodology: A comparative methodology is used in all existing schemes. We compared our scheme with the existing scheme and found that the packet loss in the proposed scheme is much less than the existing scheme.
Result: We showed that our scheme essentially detects malicious nodes for each possible scenario. Regarding communication overhead, our scheme is more efficient than typical multipath schemes. Also, by utilizing an existing routing protocol which is secure against sinkhole attacks, our scheme also provides security against sinkhole attacks.