Abstract
In wireless sensor networks, an adversary can use compromised nodes or outside jammer to launch selective forwarding attacks in which malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any more. Multipath routing can be used to counter selective forwarding attacks. However, communication overheads in multipath routing increase dramatically as the number of paths increases. In this paper, we propose a fuzzy-based reliable data delivery method to counter selective forwarding attacks. The number of paths for data delivery is determined by a fuzzy logic with consideration of the energy level of the network and the number of malicious nodes. The proposed method uses the propagation limiting method as a means for routing if multipath routing is insufficient for reliable data delivery.
This research was supported by the MIC (Ministry of Information and Communication), Korea, under the ITRC (Information Technology Research Center) support program supervised by the IITA (Institute of Information Technology Advancement). (IITA-2006-C1090-0603-0028).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Akkaya, K., Younis, M.: A survey on routing protocols for wireless sensor networks. Ad hoc Netw. 3(3), 325–349 (2004)
Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. Lect. Notes Comput. Sc. 3813, 128–141 (2005)
Ye, F., Luo, H., Lu, S.: Statistical en-route filtering of injected false data in sensor networks. IEEE J. Sel. Area Comm. 23(4), 839–850 (2005)
Yu, B., Xiao, B.: Detecting selective forwarding attacks in wireless sensor networks. In: Proc. of IPDPS (2006)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 1(2-3), 293–315 (2005)
Dulman, S., Nieberg, T., Wu, J., Havinga, P.: Trade-off between traffic overhead and reliability in multipath routing for wireless sensor networks. In: Proc. of WCNC, pp. 1918–1922 (2003)
Chi, S., Cho, T.: Fuzzy logic based propagation limiting method for message routing in wireless sensor networks. Lect. Notes Comput. Sc. 3983, 58–67 (2006)
Al-Karaki, J.N., K.A.E.: Routing techniques in wireless sensor networks: A survey. IEEE Wirel. Comm. 11(6), 6–28 (2004)
Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. IEEE ACM T. Network 11(1), 2–16 (2003)
Xu, Y., Heidemann, J., Estrin, D.: Geography-informed energy conservation for ad-hoc routing. In: Proc. of MobiCom, pp. 70–84 (2001)
Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Comput. Comm. Rev. 5(4), 11–25 (2004)
Staddon, J., Balfanz, D., Durfee, G.: Efficient tracing of failed nodes in sensor networks. In: Proc. of WSNA, 122–130 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H.Y., Cho, T.H. (2007). Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds) Ubiquitous Intelligence and Computing. UIC 2007. Lecture Notes in Computer Science, vol 4611. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73549-6_53
Download citation
DOI: https://doi.org/10.1007/978-3-540-73549-6_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73548-9
Online ISBN: 978-3-540-73549-6
eBook Packages: Computer ScienceComputer Science (R0)