CINXE.COM
{"title":"Selective Forwarding Attack and Its Detection Algorithms: A Review","authors":"Sushil Sarwa, Rajeev Kumar","volume":79,"journal":"International Journal of Computer and Information Engineering","pagesStart":918,"pagesEnd":922,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/16344","abstract":"<p>The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.<\/p>\r\n","references":"<p>[1] I. F. Akyildiz and X. Wang, \u201cA survey on wireless mesh networks,\u201d\r\nIEEE Commun. Mag., vol. 43, no. 9, pp. S23-S30, Sept. 2005.\r\n[2] D. M. Shila, Yu Cheng, and T. Anjali. Mitigating selective forwarding\r\nattacks with a channel-aware approach in WMNS. Wireless\r\nCommunications, IEEE Transactions on , 9(5):1661 \u20131675, may 2010.\r\n[3] S. Marti, T. J. Giuli, K. Lai, and M. Baker, \u201cMitigating routing\r\nmisbehavior in mobile ad hoc networks,\u201d in Proc. International\r\nConference on Mobile Computing and Networking, Boston, MA, 2000.\r\n[4] C. Karlof and D. Wagner, \u201cSecure routing in wireless sensor networks:\r\nattacks and countermeasures,\u201d Elsevier\u2019s AdHoc Networks J., vol.1, no.\r\n2-3, pp. 293-315, Sept. 2003.\r\n[5] B. Xiao, B. Yu, and C. Gao, \u201cCHEMAS: identify suspect nodes in\r\nselective forwarding attacks,\u201d J. Parallel and Distrib. Computing,vol. 67,\r\nno. 11, pp. 1218-1230, Nov. 2007.\r\n[6] D. Manikantan Shila and T. Anjali, \u201cDefending selective forwarding\r\nattacks in mesh networks,\u201d in Proc. 2008 Electro\/Information\r\nTechnology Conference , Ames, IA, May 2008.\r\n[7] R. Curtmola and C. Nita-Rotaru, \u201cBSMR: Byzantine-resilient secure\r\nmulticast routing in multi-hop wireless networks,\u201d in Proc. Sensor, Mesh\r\nand Ad Hoc Communications and Networks, June 2007.\r\n[8] A. Perrig, R. Canetti, D. Tygar, and D Song, \u201cThe TESLA Broadcast\r\nAuthentication Protocol,\u201d in RSA Crypto Bytes, Summer 2002.\r\n[9] A. D. Johnson, D. A. Maltz, and 3. Broch. \u201cThe Dynamic Source\r\nRouting Protocol for Mobile Ad-Hoc Networks\u201d (Internet-Draft).\r\nMobile Ad-hoc Network (MANET) Working Group, IETF, October\r\n1999.D. Johnson. Personal Comm- unication. February 2000.<\/p>\r\n","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 79, 2013"}