SFA-BCPF: Selective Forwarding Attacks in WSN With Bayesian Confidence-Based Packet Forwarding Algorithm
Keywords:
BCPF, SFAs, Security, Trustworthy, Wireless Sensor NetworksAbstract
Wireless Sensor Networks (WSNs) play a pivotal role in various applications, ranging from environmental monitoring to military surveillance. However, their vulnerability to malicious attacks, particularly Selective Forwarding Attacks (SFAs), poses a significant challenge to the reliability and integrity of the transmitted data. SFAs involve compromised sensor nodes selectively dropping or delaying certain packets, leading to the degradation of network performance and undermining the overall efficiency of WSNs. This research proposes a novel approach to counteract SFAs by introducing a Bayesian Confidence-Based Packet Forwarding Algorithm (BCPF). The algorithm leverages Bayesian probability theory to dynamically assess the trustworthiness of each sensor node in the network. By considering factors such as historical behavior, communication patterns, and data integrity, the algorithm assigns a confidence level to each node. Nodes with higher confidence levels are prioritized for packet forwarding, while those with lower confidence levels are subjected to additional scrutiny or avoided altogether. The Bayesian Confidence-Based Packet Forwarding Algorithm aims to enhance the robustness of WSNs against SFAs by promoting the forwarding of packets through nodes with proven reliability. This research contributes to the ongoing efforts to fortify WSNs against emerging security threats, fostering their continued deployment in critical applications.
Downloads
References
Kaur, H., Singh, P., Garg, N., & Kaur, P. (2018). Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN. Advanced Informatics for Computing Research, 501–511. doi:10.1007/978-981-13-3143-5_41
Khandare, P., Sharma, Y., & Sakhare, S. R. (2017). Countermeasures for selective forwarding and wormhole attack in WSN. 2017 International Conference on Inventive Systems and Control (ICISC). doi:10.1109/icisc.2017.8068635
Kumar, A., Paprzycki, M., & Gunjan, V. K. (Eds.). (2020). ICDSMLA 2019. Lecture Notes in Electrical Engineering. doi:10.1007/978-981-15-1420-3
Lakshmi Narayanan, K., Santhana Krishnan, R., Golden Julie, E., Harold Robinson, Y., & Shanmuganathan, V. (2021). Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks. Wireless Personal Communications. doi:10.1007/s11277-021-08277-7
Li, Y., & Wu, Y. (2020). Combine Clustering With Game to Resist Selective Forwarding in Wireless Sensor Networks. IEEE Access, 8, 138382–138395. doi:10.1109/access.2020.3012409
Liu, Y., & Wu, Y. (2021). Employ DBSCAN and Neighbor Voting to Screen Selective Forwarding Attack Under Variable Environment in Event-Driven Wireless Sensor Networks. IEEE Access, 9, 77090–77105. doi:10.1109/access.2021.3083105
Lyu, C., Zhang, X., Liu, Z., & Chi, C.-H. (2019). Selective Authentication based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things against DoS Attacks. IEEE Access, 1–1. doi:10.1109/access.2019.2902843
Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing. doi:10.1007/s10586-017-1622-9
Sert, S. A., Fung, C., George, R., & Yazici, A. (2017). An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks. 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). doi:10.1109/fuzz-ieee.2017.8015552
Shinde, M., & Mehetre, D. C. (2017). Black Hole and Selective Forwarding Attack Detection and Prevention in WSN. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). doi:10.1109/iccubea.2017.8463929
Siasi, N., Aldalbahi, A., & Jasim, M. A. (2019). Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks. 2019 International Symposium on Networks, Computers and Communications (ISNCC). doi:10.1109/isncc.2019.8909123
Sreelakshmi, T. ., & Binu, G. . (2018). Energy Efficient Detection-Removal Algorithm for Selective Forwarding Attack In Wireless Sensor Networks. 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET). doi:10.1109/iccsdet.2018.8821213
Venkata Krishna, P., & Obaidat, M. S. (Eds.). (2020). Emerging Research in Data Engineering Systems and Computer Communications. Advances in Intelligent Systems and Computing. doi:10.1007/978-981-15-0135-7
Yaseen, Q., Albalas, F., Jararwah, Y., & Al-Ayyoub, M. (2017). Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 29(4), e3183. doi:10.1002/ett.3183
Yin, R., Yuan, H., Zhu, H., & Song, X. (2021). Model and Analyze the Cascading Failure of Scale-Free Network Considering the Selective Forwarding Attack. IEEE Access, 9, 49025–49035. doi:10.1109/access.2021.3063928
Zhu, H., Zhang, Z., Du, J., Luo, S., & Xin, Y. (2018). Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks. International Journal of Distributed Sensor Networks, 14(11), 155014771881504. doi:10.1177/1550147718815046
Naderi, Mohammad, and Mohammad Ghanbari. "Adaptively prioritizing candidate forwarding set in opportunistic routing in VANETs." Ad Hoc Networks 140 (2023): 103048.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.