CINXE.COM

{"title":"Selective Forwarding Attack and Its Detection Algorithms: A Review","authors":"Sushil Sarwa, Rajeev Kumar","volume":79,"journal":"International Journal of Computer and Information Engineering","pagesStart":918,"pagesEnd":922,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/16344","abstract":"<p>The wireless mesh networks (WMNs) are emerging&nbsp;technology in wireless networking as they can serve large scale high&nbsp;speed internet access. Due to its wireless multi-hop feature, wireless&nbsp;mesh network is prone to suffer from many attacks, such as denial of&nbsp;service attack (DoS). We consider a special case of DoS attack which&nbsp;is selective forwarding attack (a.k.a. gray hole attack). In such attack,&nbsp;a misbehaving mesh router selectively drops the packets it receives&nbsp;rom its predecessor mesh router. It is very hard to detect that packet&nbsp;loss is due to medium access collision, bad channel quality or&nbsp;because of selective forwarding attack. In this paper, we present a&nbsp;review of detection algorithms of selective forwarding attack and&nbsp;discuss their advantage &amp; disadvantage. Finally we conclude this&nbsp;paper with open research issues and challenges.<\/p>\r\n","references":"<p>[1] I. F. Akyildiz and X. Wang, \u201cA survey on wireless mesh networks,\u201d\r\nIEEE Commun. Mag., vol. 43, no. 9, pp. S23-S30, Sept. 2005.\r\n[2] D. M. Shila, Yu Cheng, and T. Anjali. Mitigating selective forwarding\r\nattacks with a channel-aware approach in WMNS. Wireless\r\nCommunications, IEEE Transactions on , 9(5):1661 \u20131675, may 2010.\r\n[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, \u201cMitigating routing\r\nmisbehavior in mobile ad hoc networks,\u201d in Proc. International\r\nConference on Mobile Computing and Networking, Boston, MA, 2000.\r\n[4] C. Karlof and D. Wagner, \u201cSecure routing in wireless sensor networks:\r\nattacks and countermeasures,\u201d Elsevier\u2019s AdHoc Networks J., vol.1, no.\r\n2-3, pp. 293-315, Sept. 2003.\r\n[5] B. Xiao, B. Yu, and C. Gao, \u201cCHEMAS: identify suspect nodes in\r\nselective forwarding attacks,\u201d J. Parallel and Distrib. Computing,vol. 67,\r\nno. 11, pp. 1218-1230, Nov. 2007.\r\n[6] D. Manikantan Shila and T. Anjali, \u201cDefending selective forwarding\r\nattacks in mesh networks,\u201d in Proc. 2008 Electro\/Information\r\nTechnology Conference , Ames, IA, May 2008.\r\n[7] R. Curtmola and C. Nita-Rotaru, \u201cBSMR: Byzantine-resilient secure\r\nmulticast routing in multi-hop wireless networks,\u201d in Proc. Sensor, Mesh\r\nand Ad Hoc Communications and Networks, June 2007.\r\n[8] A. Perrig, R. Canetti, D. Tygar, and D Song, \u201cThe TESLA Broadcast\r\nAuthentication Protocol,\u201d in RSA Crypto Bytes, Summer 2002.\r\n[9] A. D. Johnson, D. A. Maltz, and 3. Broch. \u201cThe Dynamic Source\r\nRouting Protocol for Mobile Ad-Hoc Networks\u201d (Internet-Draft).\r\nMobile Ad-hoc Network (MANET) Working Group, IETF, October\r\n1999.D. Johnson. Personal Comm- unication. February 2000.<\/p>\r\n","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 79, 2013"}