Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

Full Text (PDF, 4192KB), PP.1-10

Views: 0 Downloads: 0


Wazir Zada Khan 1,* Yang Xiang 2 Mohammed Y Aalsalem 1 Quratulain Arshad 1

1. School of Computer Science Jazan University, Saudi Arabia

2. School of Information Technology Deakin University, Australia

* Corresponding author.


Received: 20 Apr. 2010 / Revised: 5 Sep. 2010 / Accepted: 16 Nov. 2010 / Published: 8 Feb. 2011

Index Terms

Selective Forwarding Attack, Sensor Network, Security


Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.

Cite This Paper

Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalem, Quratulain Arshad, "Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.3, no.1, pp.1-10, 2011. DOI:10.5815/ijcnis.2011.01.01


[1]Anthony Wood, John A. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer, 3 (10):54-62, October 2002.
[2]C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Ad Hoc Networks, Vol. 1, No. 2, 2003, pp. 293-315.
[3]B. Yu and B. Xiao, “Detecting selective forwarding attacks in wireless sensor networks,” in Proc. of the 2nd International Workshop on Security in Systems and Networks, April 2006, pp. 1-8.
[4]B. Yu and B. Xiao, “CHEMAS: identify suspect nodes in selective forwarding attacks,” in Journal of Parallel and Distributed Computing, Vol. 67, No. 11, 2007, pp. 1218-1230.
[5]S. Kaplantzis, A. Shilton, N. Mani and Y. Sekercioglu, “Detecting selective forwarding attacks in wireless sensor networks using support vector machines,” in 3rd Conf. of Intelligent Sensors Sensor Networks and Information Processing, Dec. 2007, pp. 335- 340.
[6]H. Sun, C. Chen and Y. Hsiao, “An efficient countermeasure to the selective forwarding attack in wireless sensor networks,” in Proc. Of IEEE TENCON 2007, Oct. 2007, pp. 1-4.
[7]K. Ioannis and T. Dimitriou, “Toward intrusion detection in sensor networks,” in 13th European Wireless Conference, April 2007, pp.1-7.
[8]Hae Young L, Tae Ho C. Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks. Hong Kong, China, Springer-Verlag, 2007, p. 535-544.
[9]Tran Hoang Hai, Eui-Nam Huh, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge” Seventh IEEE International Symposium on Network Computing and Applications, 2008, pp.325-331.
[10]Young Ki Kim, Hwaseong Lee, Kwantae Cho, and Dong Hoon Lee, “CADE: Cumulative Acknowledgement based Detection of Selective Forwarding Attacks inWireless Sensor Networks” Third International Conference on Convergence and Hybrid Information Technology, 2008, pp.416-422.
[11]J. Brown and X. Du, “Detection of selective forwarding attacks in heterogeneous sensor networks,” in International Conf. on Communications, May 2008, pp. 1583-1587.
[12]G.Padmavathi, D.Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks” international Journal of Computer Security, Vol. 4, No. 1 & 2, pp. 117-125, 2009
[13]Huijuan Deng, Xingming Sun, Baowei Wang, Yuanfu Cao , ‘Selective Forwarding Attack Detection using Watermark in WSNs” International Colloquium on Computing, Communication, Control, and Management (2009 ISECS), pp.109-113
[14]Xie Lei, Xu Yong-jun, Pan Yong, Zhu Yue-Fei1 ,“A Polynomialbased Countermeasure to Selective Forwarding Attacks in Sensor Networks” International Conference on Communications and Mobile Computing, 2009, pp.455- 459.
[15]Chanatip Tumrongwittayapak, Ruttikorn Varakulsiripunth, “Detecting Sinkhole Attack And Selective Forwarding Attack In Wireless Sensor Networks” ICICS 2009.
[16]Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, Wang Liangmin, “Lightweight Defense Scheme against Selective Forwarding Attacks in Wireless Sensor Networks’ pp.226-232, IEEE, 2009.
[17]Yenumula B Reddy, S. Srivathsan ,“Game Theory Model for Selective Forward Attacks in Wireless Sensor Networks” 17th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 24 - 26, 2009, pp. 458-463
[18]Guorui Li, Xiangdong Liu, and Cuirong Wang, “A Sequential Mesh Test based Selective Forwarding Attack Detection Scheme in Wireless Sensor Networks”, pp.554-558, 2010.
[19]S.-B. Lee and Y.-H. Choi, A Resilient Packet-Forwarding Scheme against Maliciously Packet Dropping Nodes in Sensor Networks, In Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks(SASN’06), pp. 59-70, 2006.
[20]S. Zhu, S. Setia, and S. Jajodia, LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, The 10th ACM Conference on Computer and Communications Security (CCS 03), 62-72, 2003
[21]S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the 6th annual international conference on Mobile Computing and Networking (MobiCom ’00), 2000, pp. 255–265.
[22]N. Nasser and Y. Chen, SEEM: Secure and energy efficient multipath routing protocol for wireless sensor networks, Computer Communications, Volume 30, Issue 11-12, pp. 2401-2412 , September 2007.
[23]N. Ahmed, S. S. Kanhere, and S. Jha, ”Intrusion Detection Techniques for Mobile Wireless Networks,” Mobile Computing and Communications Review, Vol. 9, No. 2, pp. 418, 2005.
[24]X. Pu, Z. Yan, S. Mao, Y. Zhang and Y. Li, “The sequential mesh test for a proportion,” in Journal of East China Normal University, No. 1, 2006, pp. 63-71.