By Topic

Defending selective forwarding attacks in WMNs

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Devu Manikantan Shila ; Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, 60616, USA ; Tricha Anjali

Wireless Mesh Networks (WMNs) have emerged recently as a promising technology for next-generation wireless networking to provide wide variety of applications that cannot be supported directly by other wireless networks. In WMNs, security is turning out to be a major concern and little attention has been paid to this topic by the research community. In this paper, we investigate a serious security threat known as the selective forwarding attack (gray hole attack). In a selective forwarding attack, a malicious node refuses to forward all or a subset of the packets it receives. Such selective dropping is challenging to defend against. In this paper, we present an algorithm to defend against selective forwarding attacks based on AODV routing protocol. The first phase of the algorithm is Counter-Threshold Based and uses the detection threshold and packet counter to identify the attacks and the second phase is Query-Based and uses acknowledgment from the intermediate nodes to localize the attacker. We also present simulation results to illustrate the efficiency of the proposed algorithm. To the best of our knowledge, this is the first paper to present an algorithm for defending selective forwarding attacks in WMN.

Published in:

2008 IEEE International Conference on Electro/Information Technology

Date of Conference:

18-20 May 2008