Hop-by-Hop Cooperative Detection of Selective Forwarding Attacks in Energy Harvesting Wireless Sensor Networks

Similar documents
Spy vs. Spy: Camouflage-based Active Detection in Energy Harvesting Motivated Networks

Active detection in mitigating routing misbehavior for MANETs

Index terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.

Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

Chapter 55 Elimination of Black Hole and False Data Injection Attacks in Wireless Sensor Networks

Sleep/Wake Aware Local Monitoring (SLAM)

Security Mechanisms for Selective Forwarding Attack in Wireless Sensor Networks: Review and Analysis

Network Coverage Sensitive Pseudo Geometric Broadcast Protocols in Wireless Sensor Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks

A Scalable Secured Approach in Wireless Sensor Networks

Secure Data Collection for Wireless Sensor Networks

Packet Estimation with CBDS Approach to secure MANET

Research Article Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs

Wireless Network Security Spring 2015

Wireless Sensor Networks: Security Issues, Challenges and Solutions

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks

WIRELESS sensor networks have received a lot of attention

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

Malicious Node Detection in MANET

CHAPTER 4 IMPACT OF ROUTING ATTACKS IN LOCATION BASED ROUTING PROTOCOL

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Computation of Multiple Node Disjoint Paths

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

Presented by: Mariam Ahmed Moustafa Faculty of Engineering, Alexandria University, Egypt. 24 March 2016 RIPE NCC / MENOG 16

Mitigating Malicious Activities by Providing New Acknowledgment Approach

Selective Forwarding Attacks Detection in WSNs

Comparative Study of Ids for Manet

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Channel Aware Detection based Network Layer Security in Wireless Mesh Networks

Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

DDoS PREVENTION TECHNIQUE

Wireless Network Security Spring 2011

A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism

Efficient Detection and Elimination of Vampire Attacks in Wireless Ad-Hoc Sensor Networks

ENERGY-EFFICIENT TRUST SYSTEM THROUGH WATCHDOG OPTIMIZATION

International Journal of Scientific & Engineering Research Volume 9, Issue 4, April ISSN

Wireless Network Security Spring 2016

Catching BlackHole Attacks in Wireless Sensor Networks

J. A. Drew Hamilton, Jr., Ph.D. Director, Information Assurance Laboratory and Associate Professor Computer Science & Software Engineering

Webpage: Volume 4, Issue VI, June 2016 ISSN

A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

CRYPTOGRAPHY TECHNIQUES USED IN SECRET KEY MANAGEMENT SYSTEM IN WIRELESS SENSOR NETWORK

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Fig. 2: Architecture of sensor node

Design and Implementation of TARF: A Trust Aware Routing Framework WSN s

EFFICIENT CLUSTER HEAD ELECTION FOR DETECTION AND PREVENTION OF MISDIRECTION ATTACK IN WIRELESS SENSOR NETWORK

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Survey on Attacks in Routing Protocols In Mobile Ad-Hoc Network

Defenses against Wormhole Attack

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

CMNTS:Catching Malicious Nodes with Trust Support in Wireless Sensor Networks

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Saving Wireless Networks By Detecting, And Designing Efficient From Masquerade Attacks

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Secure Adaptive Topology Control for Wireless Ad-Hoc Sensor Networks

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

CS551 Ad-hoc Routing

Chapter 18 Privacy Enhancing Technologies for Wireless Sensor Networks

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS

IN a mobile ad hoc network, nodes move arbitrarily.

CSC 774 Advanced Network Security

Implementation: Detection of Blackhole Mechanism on MANET

Routing: Collection Tree Protocol. Original slides by Omprakash Gnawal

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

International Journal of Scientific & Engineering Research, Volume 5, Issue 3, March ISSN

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT

A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

A Review on Black Hole Attack in MANET

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Subject: Adhoc Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

On Demand secure routing protocol resilient to Byzantine failures

Sybil Attack In High Throughput Multicast Routing In Wireless Mesh Network

Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Security Enhanced Adaptive Acknowledgment Intrusion Detection System

Transcription:

Hop-by-Hop Cooperative Detection of Selective Forwarding Attacks in Energy Harvesting Wireless Sensor Networks Sunho Lim and Lauren Huie Abstract Due to the lack of physical protections and security requirements of the network routing protocols, Wireless Sensor Networks (WSNs) are vulnerable to Denial-of-Service (DoS) attacks. Inherent resource constraints also hinder WSNs from deploying conventional encryption schemes and secure routing protocols. In this paper, we investigate a counter selective forwarding attack to efficiently detect the forwarding misbehaviors of malicious nodes and seamlessly deliver sensory data in energy harvesting WSNs. We first analyze a set of adversarial scenarios under an implicit acknowledgment overhearing and identify a vulnerable case. Then we propose a Hop-by-hop Cooperative Detection (HCD) scheme to efficiently detect the forwarding misbehaviors and mitigate the forwarding probabilities of malicious nodes. Extensive simulation results indicate that the proposed scheme can significantly reduce the number of forwarding misbehaviors by quickly decreasing the dropping probabilities of malicious nodes and achieve more than 9% packet delivery ratio in energy harvesting WSNs. Index Terms Denial-of-service, energy harvesting, hop-by-hop cooperative detection, selective forwarding attack, wireless sensor networks. I. INTRODUCTION Wireless Sensor Networks (WSNs) are exposed to security threats. Sensor devices (later nodes) can easily be compromised by an adversary because of the lack of physical protections. Since nodes often require long-term sensing and communication operations in an unattended or hostile area, they can be captured, tampered, or destroyed. Because nodes transceive packets over shared wireless links, the adversary can also overhear, duplicate, corrupt, or alter sensory data. In particular, WSNs are vulnerable to Denial-of-Service (DoS) attacks [] because of the lack of security requirements in network routing protocols that are not originally designed for malicious attacks. DoS attacks primarily target service availability by disrupting network routing protocols or interfering on-going communications, rather than subverting the service itself. As sensory data become sensitive, the development of DoS counterattack mechanisms is critical and challenging for secure and reliable delivery. One of well-known DoS attacks is a selective forwarding attack [], where a malicious node selectively forwards any incoming packet. The selective forwarding attack primarily targets the network routing vulnerabilities of multi-hop WSNs T WISTOR: TTU Wireless Mobile Networking Laboratory, Dept. of Computer Science, Texas Tech University, Lubbock, TX 799, Email: sunho.lim@ttu.edu; Air Force Research Laboratory, Rome, NY, Email: Lauren.Huie@us.af.mil; This research was supported in part by Air Force Summer Faculty Fellowship Program (AF SFFP) and Summer Faculty Extension Grant sponsored by Air Force Office of Scientific Research (AFOSR) and Air Force Research Laboratory (Rome, NY), respectively. by violating an implicit cooperative routing, i.e., all nodes faithfully and collaboratively route data packets to a sink. Unlike a blackhole attack [], where a malicious node simply refuses to forward any incoming packet, the selective forwarding attack is non-trivial to detect the misbehaviors of malicious nodes from temporal node failures or packet collisions. In this paper, we investigate a counter selective forwarding attack in energy harvesting WSNs, where each node is equipped with a rechargeable battery. Our main contribution is two-fold: First, we analyze four adversarial scenarios based on an implicit acknowledgment overhearing as a part of counter selective forwarding attack in energy harvesting WSNs. We observe the forwarding misbehaviors of malicious nodes, summarize the interactions between legitimate and malicious nodes in a newly suggested triplet format, and identify a vulnerable case. Second, a Hop-by-hop Cooperative Detection (HCD) scheme is proposed to efficiently detect the forwarding misbehaviors of malicious nodes and mitigate the forwarding probability of malicious nodes in energy harvesting WSNs. We develop a discrete-event driven simulation framework to observe the impact of key simulation parameters on the communication performance. Extensive simulation results indicate that the proposed scheme can significantly reduce the number of forwarding misbehaviors and increase the packet delivery ratio. To the best of our knowledge, this is the first attempt to explore a counter selective forwarding attack in energy harvesting WSNs. The rest of paper is organized as follows. The system and adversarial models followed by the proposed adversarial scenarios and counter selective forwarding attack are presented in Section II. Extensive simulation-based performance evaluation studies are conducted in Section III. Prior work and conclusion with future work are reviewed and presented in Sections IV and V, respectively. II. THE PROPOSED COUNTERATTACK A. System and Adversarial Models In this paper, energy harvesting is modeled by a two-state Markov process with active (S a ) and harvest (S h ) states. A node stays in active mode for an amount of time, which is exponentially distributed with a mean λ a, and changes to harvest mode. After energy harvesting for an amount of time

(a) (b) Fig.. A single malicious node in a network, where a malicious node (n m ) is shaded, and solid and dashed arrow lines represent packet forwarding and overhearing operations, respectively. in harvest mode, which is also assumed to be exponentially distributed with a mean λ h, the node changes back to active mode. Whenever a node changes its mode, it broadcasts a onehop Mode packet. To avoid an overhead for frequent mode changes (i.e., on-off switching cost), a node in harvest mode is unable to communicate with other nodes until a certain level of energy is harvested []. The primary goal of adversary is to attack service availability and degrade the network performance by interrupting on-going communications. The adversary is able to capture and compromise legitimate nodes so that they can behave maliciously. Two types of malicious behavior can be considered: (i) a malicious node may simply drop or selectively forward a packet to prevent a sink from receiving the packet; and (ii) a malicious node may eavesdrop an on-flying packet and inject false information or modify the packet to mislead network traffic. Note that if a sender can authenticate a packet with a light-weight digital signature [], a receiver can easily verify the packet and detect any modification. In this paper, we focus on the adversarial scenarios that cannot be detected by digital signatures and cryptographic schemes. We do not consider cryptographic primitives. B. Analysis of Adversarial Scenarios An overhearing of implicit acknowledgment is considered to monitor the forwarding behaviors of nodes. A sender overhears whether its one-hop forwardee node has forwarded the received packet without receiving an explicit acknowledgment. An energy consumption of implicit acknowledgment [] can be covered by maximizing the utilization of energy harvesting. In this paper, we investigate four adversarial scenarios (SM SM ) to observe any forwarding misbehavior and vulnerable situation in energy harvesting WSNs. Node interactions are summarized in a newly suggested triplet format. The triplet consists of Mode (M), Action (A), and Following Action (F ), where M {Active (act), Harvest (hvest), Don t Care ( )} and both A and F {Forward (f wd), Overhear (ohear), Receive (rcv), No Action ( )}. The F is any follow-up operation after the A. As a part of network, a sender (n a ), forwarding nodes (n b and n m ), and a forwardee (n c ) are setup in Fig.. Suppose one of the forwarding nodes acts maliciously, n m. If a sender is in active mode, it randomly selects a forwarding node (n b or n m ) with equal probability in Fig.. If the sender is in harvest mode, however, it holds a packet until it changes back to active mode. In Subfig. (a), suppose n a forwards a packet to n m. n b can overhear the packet and store it in its local cache. Due to the Mode packet broadcasted, n a is aware of the mode of n m. If n m is in harvest mode, n a selects n b. If n m forwards the packet to n c, which is the first scenario (SM ), both n a and n b can overhear the packet and assume that the packet has been successfully forwarded to n c. Upon receiving the packet, n c chooses another forwarding node and forwards it. If n m refuses to forward the packet, however, both n a and n c cannot overhear it. Since n b already has overheard the packet, it can directly forward its cached packet to n c as shown in Subfig. (b). Then n a can overhear the packet from n b but it suspects the forwarding behavior of n m. n m may forward a packet without considering the mode of its forwardee. Suppose n m receives a packet from n a when n c is in harvest mode. Then n m may intentionally forward the packet to n c. If n b is also in harvest mode, which is the second scenario (SM ), this forwarding misbehavior of n m is not suspected because n a can still overhear the packet from n m. If n b is in active mode, which is the third scenario (SM ), however, it suspects the forwarding behavior of n m because n b knows the mode of n c. Similar to the SM, n b forwards its cached packet to n c. Here, n a does not know what mode n c currently is. If n a overhears the packet from n b, which is different from the originally selected forwarding node (i.e., n m ), it suspects the forwarding behavior of n m. The last scenario (SM ) is when n m is in harvest mode. From a malicious node s point of view, n m should stay in active mode as long as possible to increase the chance of disrupting the forwarding operation. n a definitely chooses another forwarding node (i.e., n b ), if it is in active mode. After receiving a packet from n a, n m may also change its mode from active to harvest without broadcasting the Mode to intentionally increase the packet delivery latency. In this case, if n b is in active mode, it can forward its cached packet to n c. If n b is in harvest mode and n a does not overhear the packet from n m, n a chooses an alternative forwarding node. A vulnerable scenario is marked as in Table I. C. Cooperative Hop-by-Hop Detection Based on the adversarial scenarios, we propose a Hopby-hop Cooperative Detection (HCD) scheme to detect the forwarding misbehaviors of malicious nodes and reduce the forwarding probability of malicious nodes. A basic idea is that each node records the trace of forwarding operations using overhearing and exchanges of Mode packet and detects any forwarding misbehavior. We investigate three major issues to implement the HCD scheme: (i) what information do nodes keep to monitor the forwarding behaviors of nodes; (ii) how to detect the forwarding misbehaviors of malicious nodes based on the forwarding traces; and (iii) how to reduce and adjust the forwarding probability of malicious nodes and other forwarding nodes, respectively. First, each node records a trace of forwarding operations executed during the last ω period, and maintains a forwarding trace table (F T ) to monitor the forwarding behaviors of its neighbor nodes. Due to the limited storage space, the traces timestamped less than t cur - ω are evicted from the table,

TABLE I SUMMARY OF INTERACTIONS AMONG NODES IN THE ADVERSARIAL SCENARIOS. Scenario Forwarder Neighbor Forwardee SM n m : [M act, A fwd, ] n b : [,, ] n c : [M act, A rcv, F fwd ] SM n m : [M act, A fwd, ] n b : [M hvest,, ] n c : [M hvest,, ] SM n m : [M act, A fwd, ] n b : [M act, A ohear, F fwd ] n c : [M hvest,, ] SM n m : [M hvest,, ] n b : [,, ] n c : [,, ] where t cur and ω are the current time and a system parameter, respectively. A forwarding trace consists of five components: packet id (pid), timestamp (ts), one-hop forwardee s id (d ), two-hop forwardee s id (d ), and flag (f). Here, the packet id is used as a key to search a forwarding operation in the table. The flag indicates whether a node has overheard a packet (f = ) or not (f = ) from the forwardee. For example, when a node (n i ) sends a packet to a forwarding node (n j ) at t, it records this forwarding operation and adds it to the table, F T i = F T i [pid, t, j,, ]. Here, the two-hop forwardee is empty because it is not available. Each node also records the mode changes of its onehop neighbor nodes executed during the last ω period, and maintains a mode trace table (MT ). A mode trace consists of two components: timestamp (t x ) and mode (M x ). Whenever a node changes the current mode, it broadcasts a Mode packet piggybacked with its changed mode and mode trace table. When the node receives the Mode packet, it can also know the mode changes of its two-hop neighbor nodes. Note that nodes are only interested in the mode changes of one-hop (gi ) and two-hop (g + i ) closer neighbor nodes to a sink. For example, a node (n i ) maintains the MT i, in which a set of mode traces is mt i,k = {(t x, M x ) k gi or g+ i t cur ω t x < t cur }. Second, each node examines the received trace tables to detect any forwarding misbehavior. We investigate two forwarding misbehavior cases based on the aforementioned adversarial scenarios. Suppose n a sends a packet which will be forwarded to n c through n m. The first misbehavior case is when n c is in harvest mode in Subfig. (a): (i) When n a forwards a packet to n m at t, it records this forwarding operation in the F T a, [pid, t, m,, ]. n b can overhear the packet; (ii) Suppose n m intentionally forwards the packet to n c at t. Then n b can overhear the packet and cache it. But n b suspects a forwarding behavior of n m because it knows the current mode of n c, harvest mode. When n a overhears the packet from n m, it updates the ts, d, and f in the F T a, [pid, t, m, c, ]; (iii) When n c changes the current mode to active, it broadcasts a Mode packet piggybacked with its changed mode and MT c. Upon receiving the Mode packet, n b updates the MT b, forwards its cached packet to n c at t, and records this forwarding operation in the F T b, [pid, t, c,, ]; and (iv) When n b forwards the cached packet to n c, n a can also overhear the packet from n b. Then n a retrieves the forwarding trace from the F T a, mt a,c = [pid, t, m, c, ]. Since the same packet has been forwarded twice by n m and n b, n a checks whether n c was in harvest mode. Thus, n a can detect the forwarding misbehavior of n m because n m has forwarded the packet while n c is in harvest mode. (a) (b) Fig.. A forwarding misbehaviors of malicious node in a network. The second misbehavior case is when both n b and n c are in harvest mode in Subfig. (b): (i) When n a forwards a packet to n m at t, it records this forwarding operation in the F T a, [pid, t, m,, ]. n b cannot overhear the packet because it is in harvest mode; (ii) Suppose n m intentionally forwards the packet to n c at t. When n a overhears the packet, it updates the F T a, [pid, t, m, c, ]; and (iii) When n b changes the mode to active, it broadcasts a Mode packet piggybacked with its changed mode and MT b. Upon receiving the Mode packet, n a updates the MT a and searches any forwarding operation executed while either n b or n c is in harvest mode. Thus, n a can detect the forwarding misbehavior of n m. Third, when a node detects a forwarding misbehavior, it reduces a forwarding probability of suspected node. Initially, each node sets equal forwarding probability to all its forwarding nodes ( g ), g. A set of forwarding probabilities is stored and updated in a forwarding probability table (P T ). Whenever a forwarding misbehavior is detected, the forwarding probability of suspect node is reduced by half. The amount of reduced forwarding probability is equally divided and distributed to the rest of forwarding nodes. For example, if n i suspects n j, it reduces the forwarding probability (p i,j ) of n j by half, p i,j. Then n i equally increases the forwarding probability of its forwarding nodes by ( gi ). Thus, the more a node misbehaves, the less it will be selected as a forwarding node. Major operations of the HCD scheme are presented in Fig.. III. PERFORMANCE EVALUATION In this paper, we develop a customized simulation framework, written by CSIM9 [] that is a popular development toolkit for discrete-event simulations and modeling, to conduct our experiments. We use a mesh network, where nodes are located (m) apart. Two additional nodes are located in the end of opposite sides of the network as a traffic generator and a sink, respectively. The communication range of node is (m). Each node has five neighbor nodes and two forwarding nodes, except the nodes adjacent to the traffic generator and sink. We do not consider a single neighbor node in the network, because it could be either a single point of failure or a target to be compromised by an adversary, resulting in a network partition. The inter arrival time of traffic is assumed to be exponentially distributed, and the traffic generator node generates a packet per second. The periods of active and harvest modes are also assumed to be exponentially distributed, and they are presented as a ratio of active period to harvest period, a/h ratio. For example, a/h ratio is eight when active and harvest periods are 8 and seconds, respectively. One to six malicious nodes are p i,j

Notations: F T, MT, P T, d, d, t x, M x, ω, g, g + : defined before. pkt i [pid, src, dst, h ]: A packet sent from a node, n i, containing packet id (pid), source id (src) and destination id (dst), and the number of hops ( h ) from a sink. When n i changes the current mode: Broadcast a Mode packet piggybacked with the changed mode and MT i (mt i,k (k gi )); When n i receives a Mode from n j : Extract the changed mode and MT j (mt j,k ); for k gi or g+ i t cur ω t x do Update mt i,k with mt j,k ; end for if M x (k g + i ) == harvest F T i(d ) == k then p i,d = p i,d p and p i,q = i,q ( g i ), where q g i ; When n i forwards a packet to n j : F T i = F T i [pid, t cur, j,, ]; When n i receives a packet from n j : if n i == pkt j [dst] then Choose a forwarding node (n k, k gi ) based on the P T i; Forward the packet to n k ; F T i = F T i [pid, t cur, k,, ]; else if h i > h j then if pkt j [pid] F T i then Update d = pkt j [dst] and f = ; if M x (pkt j [dst]) == harvest then p i,j = p i,j p and p i,q = i,q ( g i ), where q g i ; else if h i < h j then Cache the packet; else /* h i == h j */ if M x (mt i,pktj [dst]) == harvest then Forward the cached packet to pkt j [dst] after receiving a Mode packet from pkt j [dst]; F T i = F T i [pid, t cur, pkt j [dst],, ]; Fig.. The pseudo code of HCD scheme. located every three other nodes in the network, and their packet dropping probability ranges from. to.. In this paper, we do not consider multiple malicious nodes located consecutively to collude among themselves and hide any forwarding misbehavior. Because of the limited storage space in resource constrained networks, we set ω as seconds. Although a large value of ω helps in detecting forwarding misbehaviors, it may cause communication overhead and lead to a scalable issue in such a dense WSNs. We measure the performance in terms of Packet Delivery Ratio (PDR), number of misbehaviors, and forwarding probability by changing key simulation parameters, number of malicious nodes, dropping probability, and a/h ratio. First, we measure the PDR by changing the number of malicious nodes and dropping probabilities in Fig.. We set all nodes to active mode to clearly see the impact of number of malicious nodes and dropping probabilities on the performance. Since the number of malicious nodes is located along a forwarding path, the probability of packet being dropped increases as a packet is propagated to a sink. Thus, the PDR quickly decreases even with a small number of malicious nodes and low dropping probabilities. This implies that a simple selective forwarding Packet Delivery Ratio.8... Number of..... Dropping Probability Fig.. Packet delivery ratio against different number of malicious nodes and dropping probabilities. Number of Misbehaviors Number of (a) p d =. Number of Misbehaviors Number of (b) p d =. Fig.. The number of forwarding misbehaviors against different number of malicious nodes and a/h ratios. Here, shaded and empty circles are with and without using the proposed scheme, respectively. attack can efficiently interfere on-going communications in the network. Second, the number of forwarding misbehaviors is counted by changing the number of malicious nodes, dropping probability, and a/h ratio in Fig.. Two dropping probabilities are used to clearly see the performance difference. As the a/h ratio increases, the number of forwarding misbehaviors decreases. This is because malicious nodes have less chance to forward a packet to the forwarding nodes in harvest mode. As the number of malicious nodes increases, more misbehavior attempts are observed. When a legitimate node forwards a packet, if all forwarding nodes are in harvest mode, it holds the packet. The legitimate mode forwards the packet when it receives the Mode packet from one of forwarding nodes in active mode. In Subfig. (a), with low dropping probability, a small number of forwarding misbehaviors are observed in large number of malicious nodes and low a/h ratio. In Subfig. (b), with high dropping probability, however, the HCD scheme can significantly reduce the number of forwarding misbehaviors. Since more misbehavior attempts are detected especially in large number of malicious nodes and low a/h ratio, malicious nodes have the less probability of being chosen as a forwarding node. Thus, the number of forwarding misbehaviors decreases. Third, whenever a node detects a forwarding misbehavior, it reduces the forwarding probability of malicious node to half and updates its forwarding probability table. If a malicious node is detected multiple times, its forwarding probability of being chosen as a forwarding node quickly decreases. We show the changes of forwarding probabilities with different dropping probabilities in Fig.. The forwarding probabilities of six malicious nodes are monitored over the simulation time. In Subfig. (a), the forwarding probabilities quickly decrease

Packet Delivery Ratio Forwarding Probability.8........ 8 Time (sec) Fig.. (a) p d =. Forwarding Probability..... 8 Time (sec) (b) p d =. Changes of forwarding probability over simulation time. (a) p d =. Number of Packet Delivery Ratio.8... (b) p d =. Number of Fig. 7. Packet delivery ratio against different number of malicious nodes and a/h ratios. Here, shaded and empty circles are with and without using the proposed scheme, respectively. even with a small dropping probability. Since more number of forwarding misbehaviors are detected under high dropping probability, the forwarding probabilities of all malicious nodes are under. after, simulation time in Subfig. (b). Finally, the PDR is measured by changing the number of malicious nodes, dropping probability, and a/h ratio in Fig. 7. The PDR is more sensitive to the a/h ratio than the number of malicious nodes and dropping probability. In the low a/h ratio, more nodes stay in harvest mode and cannot receive any incoming packet and thus, the PDR significantly decreases. As the a/h ratio increases, the PDR increases. In the HCD scheme, whenever a forwarding misbehavior is detected, the forwarding probabilities of malicious nodes become lower than that of other forwarding nodes. Thus, more legitimate nodes are chosen as a forwarding node. In Subfigs. 7(a) and (b), more than 9% PDR are achieved except when the a/h ratio and dropping probability are low and high, respectively. IV. RELATED WORK Several counter selective forwarding attacks has been proposed to efficiently detect the forwarding misbehaviors of malicious nodes in battery powered WSNs. In [] and its variations [7], [8], [9], [], a basic idea is that a set of intermediate nodes located along a forwarding path to a sink acts as a checkpoint node to monitor any forwarding misbehavior by replying an acknowledgment (Ack) packet to a source node. If an intermediate node does not receive the required number of Ack packets within a timeout period, it suspects a malicious node and send an Alarm packet to the source node through multi-hop relays. The number of Ack packets generated from intermediate nodes and how many Ack packets received by checkpoint nodes incur a performance tradeoff between detection accuracy and communication overhead. Multipath routing can be utilized to lessen the probability of encountering a malicious node. Braided paths [], originally designed for resiliency to node failures, create partially disjoint paths. Note that either forwarding Ack and Alarm packets via multi-hop relays or creating disjointed paths from nodes to a sink deployed in prior approaches may not directly be applicable to energy harvesting WSNs, where nodes are not always available due to energy availability. Unfortunately counter selective forwarding attacks are under-explored in energy harvesting WSNs. V. CONCLUSION AND FUTURE WORK In this paper, we investigated a countermeasure to selective forwarding attack in energy harvesting WSNs. We first analyzed four adversarial scenarios based on an implicit acknowledgment overhearing and then proposed a Hop-byhop Cooperative Detection (HCD) scheme to efficiently detect forwarding misbehaviors. Since the forwarding probability is reduced by half whenever a forwarding misbehavior is detected, the HCD scheme can significantly reduce the number of forwarding misbehaviors especially in the large number of malicious nodes and low a/h ratio. Thus, more than 9% PDR can be achieved. To see the full potential of the proposed techniques, we investigate multiple malicious nodes strategically located in energy harvesting WSNs, where they collude among themselves to hide their forwarding misbehaviors. For example, more than two malicious nodes are consecutively located along a forwarding path to a sink, or surround a forwardee. We plan to consider six adversarial scenarios and identify their vulnerable cases, observe any forwarding misbehavior, and extend the proposed HCD scheme. REFERENCES [] A. D. Wood and J. A. Stankovic, Denial of Service in Sensor Networks, IEEE Computer, vol., no., pp.,. [] S. Lim, J. Kimn, and H. Kim, Analysis of Energy Harvesting for Vibration-Motivated Wireless Sensor Networks, in Proc. Int l Conf. on Wireless Networks (ICWN),, pp. 9 97. [] W. Stallings, Cryptography and Network Security - Principles and Practices. Prentice Hall,. [] D. R. Raymond and S. F. Midkiff, Denial-of-Service in Wireless Sensor Networks: Attacks and Defense, IEEE Pervasive Computing, vol. 7, no., pp. 7 8, 8. [] The CSIM User Guides, http://www.mesquite.com/. [] B. Yu and B. Xiao, Detecting Selective Forwarding Attacks in Wireless Sensor Networks, in IEEE IPDPS,. [7] B. Xiao, B. Yu, and C. Gao, CHEMAS: Identify Suspect Nodes in Selective Forwarding Attacks, Journal of Parallel and Distributed Computing, vol. 7, no., pp. 8, 7. [8] H. Sun, C. Chen, and Y. Hsiao, An Efficient Countermeasure to the Selective Forwarding Attack in Wireless Sensor Networks, in IEEE Region Conference, 7, pp.. [9] S. Kaplantzis, A. Shilton, N. Mani, and Y. A. Sekercioglu, Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines, in Int l Conf. on Intelligent Sensors, Sensor Networks and Information, 7, pp.. [] Y. Kim, H. Lee, K. Cho, and D. Lee, CADE: Cumulative Acknowledgment Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks, in Int l Conf. on Convergence and Hybrid Information Technology, 8, pp.. [] D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, Highly-Resilient, Energy-Efficient Multipath Routing in Wireless Sensor Network, in Proc. MobiHoc,, pp..