An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack


Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. It is hard to defend the sensor network from the multiple attacks through existing security methods. Thus, we suggest an energy-efficient security method in order to detect the multiple attacks. This paper presents a security method to detect the false report injection attack and the selective forwarding attack in the sensor network using a new message type. The message type is a filtering message. The filtering message prevents from generating and forwarding false alert messages. We evaluated performance of our proposed method through a simulation in comparison with an application of SEF (statistical enroute filtering scheme) and CHEMAS (Check point-based Multi-hop Acknowledgement Scheme). The simulation results represent that the proposed method is 10% more energy-efficient than the application when the number of false reports is great while retaining the detection performance.

Share and Cite:

H. Lee and T. Cho, "An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack," Wireless Sensor Network, Vol. 4 No. 8, 2012, pp. 185-190. doi: 10.4236/wsn.2012.48027.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam and E. Cayirci, “A Survey on Sensor Networks,” IEEE of Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114. doi:10.1109/MCOM.2002.1024422
[2] T. F. Smith and M. S. Waterman, “Identification of Common Molecular Subsequences,” Journal of Molecular Biology, Vol. 147, No. 1, 1981, pp. 195-197. doi:10.1016/0022-2836(81)90087-5
[3] E. C. H. Ngai, J. Liu, and M. R. Lyu, “An Efficient Intruder Detection Algorithm against Sinkhole Attacks in Wireless Sensor Networks,” Computer Communications, Vol. 30, No. 11-12, 2007, pp. 2353-2364. doi:10.1016/j.comcom.2007.04.025
[4] F. Ye, H. Luo and S. W. Lu, “Statistical En-Route Filtering of Injected False Data in Sensor Networks,” Twenty-Third Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 4, 2004, pp. 2446-2457.
[5] Z. Yu and Y. Guan, “A Dynamic En-Route Filtering Scheme for Data Reporting in Wireless Sensor Networks,” Ieee- Acm Transactions on Networking, Vol. 18, No. 1, 2010, pp. 150-163. doi:10.1109/TNET.2009.2026901
[6] B. Xiao and B. Yu, “Detecting Selective Forwarding Attacks in Wireless Sensor Networks,” Parallel and Distributed Processing Symposium. IPDPS 2006. 20th International, 25-29 April 2006, pp. 25-29
[7] H. J. Deng, X. M. Sun, B. W. Wang and Y. F. Cao, “Selective Forwarding Attack Detection Using Watermark in WSNs,” ISECS International Colloquium on Computing, Communication, Control, and Management, CCCM 2009, Sanya, 8-9 August 2009, Vol. 3, pp. 109-113. doi:10.1109/CCCM.2009.5268016
[8] B. Xiao, B. Yu and C. S. Gao, “Chemas: Identify Suspect Nodes in Selective Forwarding Attacks,” Journal of Parallel and Distributed Computing, Vol. 67, No. 11, 2007, pp. 1218-1230. doi:10.1016/j.jpdc.2007.04.014
[9] R. Szewczyk, A. Perrig, J. D. Tyger, V. Wen, V. Wen and D. E. Culler, “Spins: Security Protocols for Sensor Networks,” Proceedings of ACM MobiHoc, Annapolis, June 2003, pp. 177-188.

Copyright © 2021 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.