Selective Forwarding Attack and Its Detection Algorithms: A Review
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Selective Forwarding Attack and Its Detection Algorithms: A Review

Authors: Sushil Sarwa, Rajeev Kumar

Abstract:

The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.

Keywords: CAD algorithm, CHEMAS, selective forwarding attack, watchdog & pathrater, wireless mesh network.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1087039

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2738

References:


[1] I. F. Akyildiz and X. Wang, “A survey on wireless mesh networks,” IEEE Commun. Mag., vol. 43, no. 9, pp. S23-S30, Sept. 2005.
[2] D. M. Shila, Yu Cheng, and T. Anjali. Mitigating selective forwarding attacks with a channel-aware approach in WMNS. Wireless Communications, IEEE Transactions on , 9(5):1661 –1675, may 2010.
[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proc. International Conference on Mobile Computing and Networking, Boston, MA, 2000.
[4] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Elsevier’s AdHoc Networks J., vol.1, no. 2-3, pp. 293-315, Sept. 2003.
[5] B. Xiao, B. Yu, and C. Gao, “CHEMAS: identify suspect nodes in selective forwarding attacks,” J. Parallel and Distrib. Computing,vol. 67, no. 11, pp. 1218-1230, Nov. 2007.
[6] D. Manikantan Shila and T. Anjali, “Defending selective forwarding attacks in mesh networks,” in Proc. 2008 Electro/Information Technology Conference , Ames, IA, May 2008.
[7] R. Curtmola and C. Nita-Rotaru, “BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks,” in Proc. Sensor, Mesh and Ad Hoc Communications and Networks, June 2007.
[8] A. Perrig, R. Canetti, D. Tygar, and D Song, “The TESLA Broadcast Authentication Protocol,” in RSA Crypto Bytes, Summer 2002.
[9] A. D. Johnson, D. A. Maltz, and 3. Broch. “The Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks” (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999.D. Johnson. Personal Comm- unication. February 2000.