A Restricted Multipath Routing Algorithm in Wireless Sensor Networks Using a Virtual Cylinder: Bypassing Black hole and Selective Forwarding Attacks
Keywords:Black hole attack, Restricted multipath, Routing, Selective forwarding attack, Virtual cylinder, Wireless sensor network
In this paper, a simple and novel routing algorithm is presented to improve the packet delivery in harsh conditions such as selective forwarding and blackhole attacks to the wireless sensor networks. The proposed algorithm is based on restricted multi-path broadcast based on a virtual cylinder from the source node to the sink node. In this algorithm, when a packet is broadcast by a source node, a virtual cylinder with radius w is created from the source node to a sink node. All the nodes located in this virtual cylinder are allowed to forwardthe packet to the sink. Thus, data is forwarded to sink via multiple paths, but in a restricted manner so that the nodes do not consume a high amount of energy. If there are some compromised nodes in this virtual cylinder, the packets may be forwarded to the sink via other nodes of the virtual cylinder. The proposed algorithm is simulated and evaluated in terms of packet delivery rate and energy consumption. The experiment results show that the proposed algorithm increases packet delivery rate 7 times compared to the single-path routing method and reduces energy consumption up to three times compared to flooding routing method.
A lightweight algorithm for detecting mobile sybil nodes in mobile
wireless sensor networks. Computers and Electrical Engineering,
vol. 64, pp. 220-232, 2017.
 M. Jamshidi, S.S.A. Poor, N.N. Qader, M. Esnaashari and
M.R. Meybodi. A lightweight algorithm against replica node attack
in mobile wireless sensor networks using learning agents. IEIE
Transactions on Smart Processing and Computing, vol. 8, no. 1,
pp. 58-70, 2019.
 M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh and
M. R. Meybodi. A novel model of sybil attack in cluster-based
wireless sensor networks and propose a distributed algorithm to
defend it. Wireless Personal Communications, vol. 105, no. 1, pp.
 M. Jamshidi, M. Ranjbari, M. Esnaashari, A.M. Darwesh and
M.R. Meybodi. A new algorithm to defend against sybil attack in
static wireless sensor networks using mobile observer sensor nodes.
Adhoc and Sensor Wireless Networks, vol. 43, pp. 213-238, 2019.
 M. Jamshidi, M. Ranjbari, M. Esnaashari, N. N. Qader and
M. R. Meybodi. Sybil node detection in mobile wireless sensor
networks using observer nodes. JOIV: International Journal on
Informatics Visualization, vol. 2, no. 3, pp. 159-165, 2018.
 A. Andalib, M. Jamshidi, F. Andalib and D. Momeni. A lightweight
algorithm for detecting sybil attack in mobile wireless sensor networks
using sink nodes. International Journal of Computer Applications
Technology and Research, vol. 5, no. 7, pp. 433-438, 2016.
 M. Jamshidi, A.M. Darwesh, A. Lorenc, M. Ranjbari and
M.R. Meybodi. A precise algorithm for detecting malicious sybil
nodes in mobile wireless sensor networks. IEIE Transactions on
Smart Processing and Computing, vol. 7, no. 6, pp. 457-466, 2018.
 C. Karlof and D. Wagner. Secure routing in wireless sensor
networks: Attacks and countermeasures. Ad Hoc Networks, vol. 1,
pp. 299-302, 2003.
 L. K. Bysani and A. K. Turuk. A Survey On Selective Forwarding
Attack in Wireless Sensor Networks. Proceedings of the
International Conference on Device and Communications
(ICDeCom), Mesra, India, Feb. 2011.
 M. Satyajayant, K. Bhattarai and G. Xue. BAMBi: Blackhole Attacks
Mitigation with Multiple Base Stations in Wireless Sensor Networks.
In 2011 IEEE International Conference on Communications (ICC),
IEEE, 2011, pp. 1-5.
 I. Abasikeleş-Turgut, M. N. Aydin and K. Tohma. A realistic
modelling of the sinkhole and the black hole attacks in clusterbased
WSNs. International Journal of Electronics and Electrical
Engineering, vol. 4, no. 1, pp. 74-78, Feb. 2016.
 D. Sheela, V. R. Srividhya, B. A. Asma and G. M. Chidanand.
Detecting Black Hole Attacks in Wireless Sensor Networks Using
Mobile Agent. In International Conference on Artificial Intelligence
and Embedded Systems (ICAIES, 2012, pp. 15-16.
 G. Nitesh and C. Diwaker. Detecting blackhole attack in WSN by
check agent using multiple base stations. American International
Journal of Research in Science, Technology, Engineering and
Mathematics, vol. 3, no. 2, pp. 149-152, 2013.
 V. Deepali and P. Gupta. Adaptive exponential trust-based
algorithm in wireless sensor network to detect black hole and gray
hole attacks. In: Emerging Research in Computing, Information,
Communication and Applications. Springer, Singapore, 2016, pp.
 G. Baishali. A novel intrusion detection system for detecting blackhole
nodes in manets. Networks (GRAPH-HOC), vol. 8, no. 2, pp.
 D. M. Shila, Y. Cheng, T. Anjali. Mitigating selective forwarding
attacks with a channel-aware approach in WMNs. IEEE Transaction
on Wireless Communications, vol. 9, no. 5, pp. 1661-1675, 2010.
 G. Li, X. Liu and C. Wang. A Sequential Mesh Test based Selective
Forwarding Attack Detection Scheme in Wireless Sensor Networks.
In: Proceeding of the International Conference on Networking,
Sensing and Control (ICNSC), 2010, pp. 554-558.
 Y. Hu, Y. Wu and H. Wang. Detection of insider selective forwarding
attack based on monitor node and trust mechanism in WSN.
Wireless Sensor Network, vol. 6, pp. 237-248, 2014.
 B. Yu and B. Xiao. Detecting Selective Forwarding Attacks
in Wireless Sensor Networks. In: Proceeding of the Second
International Workshop on Security in Systems and Networks
(IPDPS Workshop), 2006.
 B. Xiao, B. Yu and C. Gao. CHEMAS: Identify suspect nodes in
selective forwarding attacks. Journal of Parallel and Distributed
Computing, vol. 67, no. 11, pp. 1218-1230, 2007.
 W. K. Seach, H. X. Tan. Multipath Virtual Sink Architecture for
Underwater Sensor Networks. In: Proceeding of OCEANS, 2006.
 M. Jamshidi, A. A. Shaltooki, Z. D. Zadeh and A. M. Darwesh. A
dynamic ID assignment mechanism to defend against node replication
attack in static wireless sensor networks. JOIV: International Journal
on Informatics Visualization, vol. 3, no. 1, pp. 13-17, 2019.
 Available from: https://www.monkeyproofsolutions.nl/how-tocalculate-
accessed on 2019 Jul 10 July].