SFA-BCPF: Selective Forwarding Attacks in WSN With Bayesian Confidence-Based Packet Forwarding Algorithm


  • K. Soundarraj


BCPF, SFAs, Security, Trustworthy, Wireless Sensor Networks


Wireless Sensor Networks (WSNs) play a pivotal role in various applications, ranging from environmental monitoring to military surveillance. However, their vulnerability to malicious attacks, particularly Selective Forwarding Attacks (SFAs), poses a significant challenge to the reliability and integrity of the transmitted data. SFAs involve compromised sensor nodes selectively dropping or delaying certain packets, leading to the degradation of network performance and undermining the overall efficiency of WSNs. This research proposes a novel approach to counteract SFAs by introducing a Bayesian Confidence-Based Packet Forwarding Algorithm (BCPF). The algorithm leverages Bayesian probability theory to dynamically assess the trustworthiness of each sensor node in the network. By considering factors such as historical behavior, communication patterns, and data integrity, the algorithm assigns a confidence level to each node. Nodes with higher confidence levels are prioritized for packet forwarding, while those with lower confidence levels are subjected to additional scrutiny or avoided altogether. The Bayesian Confidence-Based Packet Forwarding Algorithm aims to enhance the robustness of WSNs against SFAs by promoting the forwarding of packets through nodes with proven reliability. This research contributes to the ongoing efforts to fortify WSNs against emerging security threats, fostering their continued deployment in critical applications.


Download data is not yet available.


Kaur, H., Singh, P., Garg, N., & Kaur, P. (2018). Enhanced TESRP Protocol for Isolation of Selective Forwarding Attack in WSN. Advanced Informatics for Computing Research, 501–511. doi:10.1007/978-981-13-3143-5_41

Khandare, P., Sharma, Y., & Sakhare, S. R. (2017). Countermeasures for selective forwarding and wormhole attack in WSN. 2017 International Conference on Inventive Systems and Control (ICISC). doi:10.1109/icisc.2017.8068635

Kumar, A., Paprzycki, M., & Gunjan, V. K. (Eds.). (2020). ICDSMLA 2019. Lecture Notes in Electrical Engineering. doi:10.1007/978-981-15-1420-3

Lakshmi Narayanan, K., Santhana Krishnan, R., Golden Julie, E., Harold Robinson, Y., & Shanmuganathan, V. (2021). Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks. Wireless Personal Communications. doi:10.1007/s11277-021-08277-7

Li, Y., & Wu, Y. (2020). Combine Clustering With Game to Resist Selective Forwarding in Wireless Sensor Networks. IEEE Access, 8, 138382–138395. doi:10.1109/access.2020.3012409

Liu, Y., & Wu, Y. (2021). Employ DBSCAN and Neighbor Voting to Screen Selective Forwarding Attack Under Variable Environment in Event-Driven Wireless Sensor Networks. IEEE Access, 9, 77090–77105. doi:10.1109/access.2021.3083105

Lyu, C., Zhang, X., Liu, Z., & Chi, C.-H. (2019). Selective Authentication based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things against DoS Attacks. IEEE Access, 1–1. doi:10.1109/access.2019.2902843

Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing. doi:10.1007/s10586-017-1622-9

Sert, S. A., Fung, C., George, R., & Yazici, A. (2017). An efficient fuzzy path selection approach to mitigate selective forwarding attacks in wireless sensor networks. 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). doi:10.1109/fuzz-ieee.2017.8015552

Shinde, M., & Mehetre, D. C. (2017). Black Hole and Selective Forwarding Attack Detection and Prevention in WSN. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). doi:10.1109/iccubea.2017.8463929

Siasi, N., Aldalbahi, A., & Jasim, M. A. (2019). Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks. 2019 International Symposium on Networks, Computers and Communications (ISNCC). doi:10.1109/isncc.2019.8909123

Sreelakshmi, T. ., & Binu, G. . (2018). Energy Efficient Detection-Removal Algorithm for Selective Forwarding Attack In Wireless Sensor Networks. 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET). doi:10.1109/iccsdet.2018.8821213

Venkata Krishna, P., & Obaidat, M. S. (Eds.). (2020). Emerging Research in Data Engineering Systems and Computer Communications. Advances in Intelligent Systems and Computing. doi:10.1007/978-981-15-0135-7

Yaseen, Q., Albalas, F., Jararwah, Y., & Al-Ayyoub, M. (2017). Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 29(4), e3183. doi:10.1002/ett.3183

Yin, R., Yuan, H., Zhu, H., & Song, X. (2021). Model and Analyze the Cascading Failure of Scale-Free Network Considering the Selective Forwarding Attack. IEEE Access, 9, 49025–49035. doi:10.1109/access.2021.3063928

Zhu, H., Zhang, Z., Du, J., Luo, S., & Xin, Y. (2018). Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks. International Journal of Distributed Sensor Networks, 14(11), 155014771881504. doi:10.1177/1550147718815046

Naderi, Mohammad, and Mohammad Ghanbari. "Adaptively prioritizing candidate forwarding set in opportunistic routing in VANETs." Ad Hoc Networks 140 (2023): 103048.




How to Cite

Soundarraj, K. . (2024). SFA-BCPF: Selective Forwarding Attacks in WSN With Bayesian Confidence-Based Packet Forwarding Algorithm. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 1646–1654. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5640



Research Article