Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN


The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.

Share and Cite:

Hu, Y. , Wu, Y. and Wang, H. (2014) Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN. Wireless Sensor Network, 6, 237-248. doi: 10.4236/wsn.2014.611023.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Yu, Y.L., Li, K.Q., Zhou, W.L. and Li, P. (2011) Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures. Journal of Network and Computer Applications, 35, 867-880.
[2] He, B., Joshi, S., Agrawal, D.P. and Sun, D. (2010) An Efficient Authenticated Key Establishment Scheme for Wireless Mesh Networks. 2010 IEEE Global Telecommunications Conference, Miami, 6-10 December 2010, 6-10.
[3] Butun, I., Morgera, S.D. and Sankar, R. (2013) A Survey of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, 16, 266-282.
[4] Cho, Y. and Qu, G. (2013) Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs. International Journal of Distributed Sensor Networks, 2013, Article ID: 205920, 16 p.
[5] Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000) Mitigating Routing Misbehavior in Mobile and Ad Hoc Networks. Proceedings of International Conference on Mobile Computing and Networking, Boston, 6-11 August 2000, 255-265.
[6] Hai, T.H. and Huh, E.-N. (2008) Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-Hops Neighbor Knowledge. 2013 IEEE 12th International Symposium on Network Computing and Applications, Cambridge, 10-12 July 2008, 325-331.
[7] Khalil, I., Bagchi, S., Rotaru, C.N. and Shroff, N.B. (2009) UnMask: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks. Ad Hoc Networks, 8, 148-164.
[8] Lu, Y.F., Lin, K. and Li, K.Q. (2012) Trust Evaluation Model against Insider Attack in Wireless Sensor Networks. International Conference on Cloud and Green Computing, Xiangtan, 1-3 November 2012, 319-326.
[9] Karlof, C. and Wagner, D. (2003) Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks, 1, 293-315.
[10] Challal, Y., Ouadjaout, A., Lasla, N., Bagaa, M. and Hadjidj, A. (2011) Secure and Efficient Disjoint Multipath Construction for Fault Tolerant Routing in Wireless Sensor Networks. Journal of Network and Computer Applications, 34, 1380-1397.
[11] Shu, T., Liu, S. and Krunz, M. (2009) Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes. Proceedings of the IEEE INFOCOM Conference, Rio de Janeiro, 19-25 April 2009, 2846-2850.
[12] Sun, H.-M., Che, C.-M. and Hsiao, Y.-C. (2007) An Efficient Countermeasure to the Selective Forwarding Attack in Wireless Sensor Network. IEEE Region 10 Conference (TENCON), Taipei, 30 October-2 November 2007, 1-4.

Copyright © 2021 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.