Main Article Content

Gulbir Singh
Om Prakash Dubey
Gautam Kumar


Wireless mesh network, Selective forward attack, sensor network, routing, AODV


Wireless mesh network represent a solution to provide wireless connectivity. There is some attacks on wireless sensor networks like black hole attack, sinkhole attack, Sybil attack, selective forwarding, etc. In this paper, we will concentrate on selective forwarding attack. Selective Forwarding Attack is one of the many security threats in wireless sensor networks which can degrade network performance. An adversary on the transmission path selectively drops the packet. The adversary same time transfers the packet, while in a few occasions it drops the packet. It is difficult to detect this type of attack since the packet loss may be due to unreliable wireless communication. The proposed scheme is based on the trust value of each node. During data transmission, a node selects a downstream node that has highest trust value, which is updated dynamically based on the number of packets a node has forwarded and dropped. We compared our scheme with the existing scheme and found that the packet loss in the proposed scheme is much less than the existing scheme.


Download data is not yet available.
Abstract 351 | PDF Downloads 200


[1]. CIanF. Akyildiz, XudongWang, Weilin Wang, Wireless Mesh Network: a survey, 1-5, 28-29 Dec. 2010
[2] A.Kim, S. Pakzad, D. Culler, J. Demmel, G. Fenves, S. Glaser,M.Turon,“RoutingprotocolinWirelesmeshnetwork:challangesanddesign considerations” , In Proc. Springer Science LLC 2006.pp. 285-303.
[3]. Ad hoc On-Demand Distance Vector (AODV) Routing (2003, Febru- ary) http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-13.txt 4 A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W.Chen, “Scalable Routing Strategies for Ad Hoc Wireless Networks, IEEE Journal on Selected Areas in communications, Special Issue on Ad-Hoc Networks, pp.1369-79, Aug2011
[4]. YS.R. Das, C. E. Perkins and E. M. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks, in Proceedings of the IEEE Conference on Computer Communications (INFOCOM)”, Tel Aviv, Israel, pp.312, March 2011.
[5] A. Boukerche, “Performance evaluation of routing protocols for ad hoc wireless networks, MobileNetworks and Applications” ,Vol.9, No.4, pp.333342,2013
[6] Wu]V. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks”, Proc. IEEE INFOCOM 11, Kobe,Japan (2011)
[7] H.M. Nyo and P. Viriyaphol, “Detecting and Eliminating Black Hole in AODV Routing”, IEEE, Jan 2011,pp.1-4