Skip to main content

Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4611))

Abstract

In wireless sensor networks, an adversary can use compromised nodes or outside jammer to launch selective forwarding attacks in which malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any more. Multipath routing can be used to counter selective forwarding attacks. However, communication overheads in multipath routing increase dramatically as the number of paths increases. In this paper, we propose a fuzzy-based reliable data delivery method to counter selective forwarding attacks. The number of paths for data delivery is determined by a fuzzy logic with consideration of the energy level of the network and the number of malicious nodes. The proposed method uses the propagation limiting method as a means for routing if multipath routing is insufficient for reliable data delivery.

This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2006-C1090-0603-0028).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad hoc Netw. 3(3), 325–349 (2004)

    Google Scholar 

  3. Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. Lect. Notes Comput. Sc. 3813, 128–141 (2005)

    Article  Google Scholar 

  4. Ye, F., Luo, H., Lu, S.: Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)

    Article  Google Scholar 

  5. Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proc. of IPDPS (2006)

    Google Scholar 

  6. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 1(2-3), 293–315 (2005)

    Article  Google Scholar 

  7. Dulman, S., Nieberg, T., Wu, J., Havinga, P.: Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In: Proc. of WCNC, pp. 1918–1922 (2003)

    Google Scholar 

  8. Chi, S., Cho, T.: Fuzzy logic based propagation limiting method for message routing in wireless sensor networks. Lect. Notes Comput. Sc. 3983, 58–67 (2006)

    Article  Google Scholar 

  9. Al-Karaki, J.N., K.A.E.: Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Comm. 11(6), 6–28 (2004)

    Article  Google Scholar 

  10. Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. IEEE ACM T. Network 11(1), 2–16 (2003)

    Article  Google Scholar 

  11. Xu, Y., Heidemann, J., Estrin, D.: Geography-informed energy conservation for ad-hoc routing. In: Proc. of MobiCom, pp. 70–84 (2001)

    Google Scholar 

  12. Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Comput. Comm. Rev. 5(4), 11–25 (2004)

    Article  Google Scholar 

  13. Staddon, J., Balfanz, D., Durfee, G.: Efficient tracing of failed nodes in sensor networks. In: Proc. of WSNA, 122–130 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jadwiga Indulska Jianhua Ma Laurence T. Yang Theo Ungerer Jiannong Cao

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H.Y., Cho, T.H. (2007). Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds) Ubiquitous Intelligence and Computing. UIC 2007. Lecture Notes in Computer Science, vol 4611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73549-6_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73549-6_53

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73548-9

  • Online ISBN: 978-3-540-73549-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics