IEEE Access (Jan 2021)

Employ DBSCAN and Neighbor Voting to Screen Selective Forwarding Attack Under Variable Environment in Event-Driven Wireless Sensor Networks

  • Yinghong Liu,
  • Yuanming Wu

DOI
https://doi.org/10.1109/ACCESS.2021.3083105
Journal volume & issue
Vol. 9
pp. 77090 – 77105

Abstract

Read online

In the event-driven wireless sensor networks (EWSNs), the event of interests occurs irregularly and at random in the network. Then, sensor nodes near the event sense the event and send out data packets of the event. Next, router nodes (RNs) forward those packets to the sink node (SN) by multi-hop communications. Compromised RNs would become malicious and launch selective forwarding attacks by dropping part of or all the packets from other nodes. On the other hand, a harsh environment makes the channel poor, so the routing nodes under a harsh environment have low packet forwarding rates because they sometimes have to give up forwarding the current packets after many tries to forward them due to poor channel. If the malicious nodes’ forwarding rates become close to those of nodes under a harsh environment, the schemes based on packet forwarding rates for detecting selective forwarding attack may fail because they cannot differentiate the low data packet forwarding rates resulting from the malicious behaviors or harsh environment. To solve this problem, we provide a combined scheme for detecting selective forwarding attack in wireless sensor networks (WSNs) under harsh environments. This scheme employs a data clustering algorithm (DCA) to screen the malicious nodes out by clustering their cumulative forwarding rates (CFRs) and designs a voting decision method to protect the nodes under a harsh environment from being judged as malicious nodes. The simulation results show that our scheme has a low false detection rate (FDR) of 1% and a low missed detection rate (MDR) of 5% respectively with negligible energy consumption in WSNs under a local variable harsh environment.

Keywords