Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN
Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissi...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2021-05, Vol.118 (1), p.789-814 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 814 |
---|---|
container_issue | 1 |
container_start_page | 789 |
container_title | Wireless personal communications |
container_volume | 118 |
creator | Singh, Surinder Saini, Hardeep Singh |
description | Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission. |
doi_str_mv | 10.1007/s11277-020-08044-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2515145780</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2515145780</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</originalsourceid><addsrcrecordid>eNp9kEFLw0AQhRdRsFb_gKeA59XZ2SSbHGuxVSgKtqK3ZbuZ1NSa1N1E6b93awRvngaG97158xg7F3ApANSVFwKV4oDAIYM45nDABiJRyDMZvxyyAeSY8xQFHrMT79cAActxwB5nZFxd1St-bTwV0Zxs56p2Fy3IvtbVR0dR2biw3pBtq0-KJo37Mq4IRDRqW2PfoqqOxpvOt-QC_zy_P2VHpdl4OvudQ_Y0uVmMb_nsYXo3Hs24lSJveYiZphhnQCiVxCIrRSKEsbjMrRJEiSkyqwqJaaoAJanwDWaQgAEoC7OUQ3bR-25dE3L6Vq-bztXhpMYkeMWJyiCosFdZ13jvqNRbV70bt9MC9L473XenQ3f6pzu9h2QP-SCuV-T-rP-hvgHe1XAW</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2515145780</pqid></control><display><type>article</type><title>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</title><source>Springer Nature - Complete Springer Journals</source><creator>Singh, Surinder ; Saini, Hardeep Singh</creator><creatorcontrib>Singh, Surinder ; Saini, Hardeep Singh</creatorcontrib><description>Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-020-08044-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Clusters ; Communications Engineering ; Computer Communication Networks ; Data transmission ; Engineering ; Fire damage ; Forest fires ; Methodology ; Military applications ; Networks ; Nodes ; Signal,Image and Speech Processing ; Time functions</subject><ispartof>Wireless personal communications, 2021-05, Vol.118 (1), p.789-814</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC part of Springer Nature 2021.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</citedby><cites>FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-020-08044-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-020-08044-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27901,27902,41464,42533,51294</link.rule.ids></links><search><creatorcontrib>Singh, Surinder</creatorcontrib><creatorcontrib>Saini, Hardeep Singh</creatorcontrib><title>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.</description><subject>Clusters</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Data transmission</subject><subject>Engineering</subject><subject>Fire damage</subject><subject>Forest fires</subject><subject>Methodology</subject><subject>Military applications</subject><subject>Networks</subject><subject>Nodes</subject><subject>Signal,Image and Speech Processing</subject><subject>Time functions</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kEFLw0AQhRdRsFb_gKeA59XZ2SSbHGuxVSgKtqK3ZbuZ1NSa1N1E6b93awRvngaG97158xg7F3ApANSVFwKV4oDAIYM45nDABiJRyDMZvxyyAeSY8xQFHrMT79cAActxwB5nZFxd1St-bTwV0Zxs56p2Fy3IvtbVR0dR2biw3pBtq0-KJo37Mq4IRDRqW2PfoqqOxpvOt-QC_zy_P2VHpdl4OvudQ_Y0uVmMb_nsYXo3Hs24lSJveYiZphhnQCiVxCIrRSKEsbjMrRJEiSkyqwqJaaoAJanwDWaQgAEoC7OUQ3bR-25dE3L6Vq-bztXhpMYkeMWJyiCosFdZ13jvqNRbV70bt9MC9L473XenQ3f6pzu9h2QP-SCuV-T-rP-hvgHe1XAW</recordid><startdate>20210501</startdate><enddate>20210501</enddate><creator>Singh, Surinder</creator><creator>Saini, Hardeep Singh</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20210501</creationdate><title>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</title><author>Singh, Surinder ; Saini, Hardeep Singh</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-804662480e23732d8f1511ac2b9c71ee5ad8c7d32667023e757228050a00fdab3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Clusters</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Data transmission</topic><topic>Engineering</topic><topic>Fire damage</topic><topic>Forest fires</topic><topic>Methodology</topic><topic>Military applications</topic><topic>Networks</topic><topic>Nodes</topic><topic>Signal,Image and Speech Processing</topic><topic>Time functions</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Singh, Surinder</creatorcontrib><creatorcontrib>Saini, Hardeep Singh</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Singh, Surinder</au><au>Saini, Hardeep Singh</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2021-05-01</date><risdate>2021</risdate><volume>118</volume><issue>1</issue><spage>789</spage><epage>814</epage><pages>789-814</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Selective forwarding attacks in WSN can damage many mission-critical applications, like military surveillance and forest fire censoring. In such attacks, malicious nodes most of the time functions like regular nodes, but sometimes drop sensitive packets selectively, like a packet recording the dissimilar power' activity, making it more difficult to identify their malicious intent. The current selective forwarding attack detection schemes, randomly select checkpoint nodes, available in-between nodes within a forwarding route, which are responsible for producing acknowledgments for each received packet. In this paper, the complete sets of nodes are differentiated into three different types based on their functionality as Inspector Node (IN), Cluster Head (CH), and Member Nodes (MN). The newly considered node as IN is considered to overhear all of the activities of the Cluster head, as CH is the most compromising node in the complete cluster, and in the case, if the CH is attacked then the complete cluster stops working in the network. The IN is trained based on certain rules and predefined parameters which analyses if the CH or MN is malicious or not and considers the required action. NS2 is considered for the simulation of the proposed methodology and also for the validation of the proposed work. In the proposed methodology, two different stages are considered as detection and correction, which works to tackle the attacks and also considering the system efficiency almost. As in the proposed methodology, the effect of the attack is minimized which increases the QOS and also better data transmission.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-020-08044-0</doi><tpages>26</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2021-05, Vol.118 (1), p.789-814 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_2515145780 |
source | Springer Nature - Complete Springer Journals |
subjects | Clusters Communications Engineering Computer Communication Networks Data transmission Engineering Fire damage Forest fires Methodology Military applications Networks Nodes Signal,Image and Speech Processing Time functions |
title | Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T02%3A26%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Learning-Based%20Security%20Technique%20for%20Selective%20Forwarding%20Attack%20in%20Clustered%20WSN&rft.jtitle=Wireless%20personal%20communications&rft.au=Singh,%20Surinder&rft.date=2021-05-01&rft.volume=118&rft.issue=1&rft.spage=789&rft.epage=814&rft.pages=789-814&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-020-08044-0&rft_dat=%3Cproquest_cross%3E2515145780%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2515145780&rft_id=info:pmid/&rfr_iscdi=true |