Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN

Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2021-05, Vol.118 (1), p.789-814
Hauptverfasser: Singh, Surinder, Saini, Hardeep Singh
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 814
container_issue 1
container_start_page 789
container_title Wireless personal communications
container_volume 118
creator Singh, Surinder
Saini, Hardeep Singh
description Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.
doi_str_mv 10.1007/s11277-020-08044-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2515145780</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2515145780</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</originalsourceid><addsrcrecordid>eNp9kEFLw0AQhRdRsFb_gKeA59XZ2SSbHGuxVSgKtqK3ZbuZ1NSa1N1E6b93awRvngaG97158xg7F3ApANSVFwKV4oDAIYM45nDABiJRyDMZvxyyAeSY8xQFHrMT79cAActxwB5nZFxd1St-bTwV0Zxs56p2Fy3IvtbVR0dR2biw3pBtq0-KJo37Mq4IRDRqW2PfoqqOxpvOt-QC_zy_P2VHpdl4OvudQ_Y0uVmMb_nsYXo3Hs24lSJveYiZphhnQCiVxCIrRSKEsbjMrRJEiSkyqwqJaaoAJanwDWaQgAEoC7OUQ3bR-25dE3L6Vq-bztXhpMYkeMWJyiCosFdZ13jvqNRbV70bt9MC9L473XenQ3f6pzu9h2QP-SCuV-T-rP-hvgHe1XAW</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2515145780</pqid></control><display><type>article</type><title>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</title><source>Springer Nature - Complete Springer Journals</source><creator>Singh, Surinder ; Saini, Hardeep Singh</creator><creatorcontrib>Singh, Surinder ; Saini, Hardeep Singh</creatorcontrib><description>Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-020-08044-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Clusters ; Communications Engineering ; Computer Communication Networks ; Data transmission ; Engineering ; Fire damage ; Forest fires ; Methodology ; Military applications ; Networks ; Nodes ; Signal,Image and Speech Processing ; Time functions</subject><ispartof>Wireless personal communications, 2021-05, Vol.118 (1), p.789-814</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</citedby><cites>FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-020-08044-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-020-08044-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Singh, Surinder</creatorcontrib><creatorcontrib>Saini, Hardeep Singh</creatorcontrib><title>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.</description><subject>Clusters</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Data transmission</subject><subject>Engineering</subject><subject>Fire damage</subject><subject>Forest fires</subject><subject>Methodology</subject><subject>Military applications</subject><subject>Networks</subject><subject>Nodes</subject><subject>Signal,Image and Speech Processing</subject><subject>Time functions</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEFLw0AQhRdRsFb_gKeA59XZ2SSbHGuxVSgKtqK3ZbuZ1NSa1N1E6b93awRvngaG97158xg7F3ApANSVFwKV4oDAIYM45nDABiJRyDMZvxyyAeSY8xQFHrMT79cAActxwB5nZFxd1St-bTwV0Zxs56p2Fy3IvtbVR0dR2biw3pBtq0-KJo37Mq4IRDRqW2PfoqqOxpvOt-QC_zy_P2VHpdl4OvudQ_Y0uVmMb_nsYXo3Hs24lSJveYiZphhnQCiVxCIrRSKEsbjMrRJEiSkyqwqJaaoAJanwDWaQgAEoC7OUQ3bR-25dE3L6Vq-bztXhpMYkeMWJyiCosFdZ13jvqNRbV70bt9MC9L473XenQ3f6pzu9h2QP-SCuV-T-rP-hvgHe1XAW</recordid><startdate>20210501</startdate><enddate>20210501</enddate><creator>Singh, Surinder</creator><creator>Saini, Hardeep Singh</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210501</creationdate><title>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</title><author>Singh, Surinder ; Saini, Hardeep Singh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Clusters</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Data transmission</topic><topic>Engineering</topic><topic>Fire damage</topic><topic>Forest fires</topic><topic>Methodology</topic><topic>Military applications</topic><topic>Networks</topic><topic>Nodes</topic><topic>Signal,Image and Speech Processing</topic><topic>Time functions</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Singh, Surinder</creatorcontrib><creatorcontrib>Saini, Hardeep Singh</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Singh, Surinder</au><au>Saini, Hardeep Singh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-05-01</date><risdate>2021</risdate><volume>118</volume><issue>1</issue><spage>789</spage><epage>814</epage><pages>789-814</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-020-08044-0</doi><tpages>26</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2021-05, Vol.118 (1), p.789-814
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_2515145780
source Springer Nature - Complete Springer Journals
subjects Clusters
Communications Engineering
Computer Communication Networks
Data transmission
Engineering
Fire damage
Forest fires
Methodology
Military applications
Networks
Nodes
Signal,Image and Speech Processing
Time functions
title Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T02%3A26%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Learning-Based%20Security%20Technique%20for%20Selective%20Forwarding%20Attack%20in%20Clustered%20WSN&rft.jtitle=Wireless%20personal%20communications&rft.au=Singh,%20Surinder&rft.date=2021-05-01&rft.volume=118&rft.issue=1&rft.spage=789&rft.epage=814&rft.pages=789-814&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-020-08044-0&rft_dat=%3Cproquest_cross%3E2515145780%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2515145780&rft_id=info:pmid/&rfr_iscdi=true