A SOLUTION TO SELECTIVE FORWARD ATTACK IN WIRELESS SENSOR NETWORK

Purpose of Study: Wireless mesh network represents a solution to provide wireless connectivity. There are some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on a selective forwarding attack. Selective Forwarding Attack is one of the many security threats in wireless sensor networks that can degrade network performance. An adversary on the transmission path selectively drops the packet. The adversary same time transfers the packet, while on a few occasions it drops the packet. It is difficult to detect this type of attack since the packet loss may be due to unreliable wireless communication. The proposed scheme is based on the trust value of each node. During data transmission, a node selects a downstream node that has the highest trust value, which is updated dynamically based on the number of packets a node has forwarded and dropped. Methodology: A comparative methodology is used in all existing schemes. We compared our scheme with the existing scheme and found that the packet loss in the proposed scheme is much less than the existing scheme. Result: We showed that our scheme essentially detects malicious nodes for each possible scenario. Regarding communication overhead, our scheme is more efficient than typical multipath schemes. Also, by utilizing an existing routing protocol which is secure against sinkhole attacks, our scheme also provides security against sinkhole attacks.


INTRODUCTION
WMNs are not built on a fixed infrastructure. Instead of this, hosts rely on each other to keep the connection. WMNs provide low-cost broadband internet access, wireless LAN coverage and network connection to fixed or mobile hosts for both network operators and users. The reason for preferring WMNs is easy, fast and deployment of the technology. A WMN consists of mesh routers and mesh clients. Mesh routers are fixed. They have a wireless infrastructure and work with the other networks to provide a multi-hop internet access service for mesh clients. On the other hand, mesh clients can connect to the network over both mesh routers and other clients. In these networks, due to a large number of nodes, working through some issues like security, scalability, and manageability is required. Thus, new applications of WMNs make secrecy, and security mechanisms are necessities each sensor node consists of a radio transceiver for communication purposes, a microcontroller for processing abilities, a sensor for sensing or monitoring and battery for providing energy. Some of the popular applications of the sensor network are area monitoring, environment monitoring (such as pollution monitoring), industrial and machine health monitoring, wastewater monitoring and military surveillance. Security is crucial for wireless sensor networks deployed in hostile environments. Providing security solutions to these networks is difficult due to its characteristics such as tiny in nature and constraints in resources. One of the attacks in WSN is the Selective Forwarding attack.

A. Detection using Watermark in Wireless Sensor Networks
CIanF. Akyildiz, XudongWang, Weilin Wang (2010): In this paper to proposed a scheme of secure data transmission which can forward the data safely, and detect the selective forwarding attack judge the trust value of each node to select a secure path for message forwarding and then use the watermark technology to detect the malicious nodes which are suspected to launch selective forwarding attack. When such an attack is detected, the detection mode starts. The malicious node can be detected and addressed. The watermarking technique is used to protect data transmission safely.

B. CHEMAS
This paper is presented by A. Boukerche (2013) proposed performance evaluation of routing protocols for ad hoc wireless networks.
A multi-hop acknowledgment scheme for detecting selective forwarding attacks. The intermediate nodes are responsible for detecting the misbehavior of the nodes.

C. A Polynomial-based Countermeasure to Selective Forwarding Attacks in Sensor Networks
YS.R. Das, C. E. Perkins and E. M. Royer (2011) have proposed a polynomial modeling based countermeasure against selective forwarding attack and a security scheme using redundant data to tolerate the loss of critical event messages. The basic idea is to split the sensing data into parts and to send these parts instead of the original sensing data to the sink by adopting a dynamic individual path forwarding mechanism so that, the forwarding nodes cannot understand the contents of the data generated by the polynomial, which can prevent eavesdropping.

D. Security Issues in Wireless Sensor Networks
Gautam U, Singh G (2014), provides a comparative study of TCP protocol over Network Routing Protocols for Mobile Ad Hoc Networks. Given this paper provides an overview of security issues known so far in wireless sensor networks. In the absence of adequate security, deployment of sensor networks is vulnerable to a variety of attacks. In this paper, we have discussed threat models and unique security issues faced by wireless sensor networks.

E. Intrusion Detection for Routing Attacks in Sensor Networks
Singh G (2014), implemented a comparative study of three routing protocols(DSDV, AOMDV, DSR) in MANETS using Network Simulator 2. We present a method for intrusion detection in wireless sensor networks. Our intrusion detection scheme uses a clustering algorithm to build a model of normal traffic behavior and then uses this model of normal traffic to detect abnormal traffic patterns.

Detecting Selective Forwarding Attacks in Wireless Sensor Networks using SVMs
A centralized intrusion detection scheme based on Support Vector Machines (SVMs) and has used sliding windows for black hole attacks and selective forwarding attacks. In this scheme, they only detect the attacks. This scheme uses routing information local to the base station of the network and raises alarms based on the 2D feature vector (bandwidth, hop count). Classification of the data patterns is performed using a one-class SVM classifier. They use anomaly detection as a base for their scheme. Anomaly detection signals an intrusion when the observed activities differ significantly from those usually undertaken by the user.

Fuzzy-Based Reliable Data Delivery for countering selective Forwarding in Sensor Networks
A Fuzzy-based reliable data delivery scheme for countering selective forwarding attack which is an improved form of Multipath routing method. The enhancement is that the number of transmission path varies with a number of the attacker.

CONCLUSION
For data transmission, we use the multi-hop system. In the multi-hop system from which route, we transmission our data is an issue. For selecting route among multi-hop and multiple paths, known as Routing. Routing security is an important issue in WMN as well as another wireless network. We need to consider a better tradeoff between higher security and network performance while designing a secure protocol for routing. Selective forwarding attacks can be serious threats on wireless sensor networks. In this paper, we presented an efficient detection scheme against selective forwarding attacks. We showed that our scheme essentially detects malicious nodes for each possible scenario. Regarding communication overhead, our scheme is more efficient than typical multipath schemes. Also, by utilizing an existing routing protocol which is secure against sinkhole attacks, our scheme also provides security against sinkhole attacks. To reduce the communication overhead as well as to save the consuming energy in each sensor node, we can deliver packets normally in a leisure period, only activating the detection scheme in some sensitive intervals. Several potential approaches remain to be taken to improve the defense capabilities of our scheme. For instance, the use of downstream detection would help the base station to collect alert information; the incorporation of proper redundancy.