{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T10:02:23Z","timestamp":1760608943564,"version":"build-2065373602"},"reference-count":15,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T00:00:00Z","timestamp":1474329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2015J054"],"award-info":[{"award-number":["ZYGX2015J054"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>A wireless sensor network (WSN) faces a number of outsider and insider attacks, and it is difficult to detect and defend against insider attacks. In particular, an insider selective-forwarding attack, in which the attackers select some of the received packets to drop, most threatens a WSN. Compared to a distributed WSN, a cluster-based WSN will suffer more losses, even the whole network\u2019s destruction, if the cluster head is attacked. In this paper, a scheme solving the above issues is proposed with three types of nodes, the Cluster Head (CH), the Inspector Node (IN) and Member Nodes (MNs). The IN monitors the CH\u2019s transmission to protect the cluster against a selective-forwarding attack; the CH forwards packets from MNs and other CHs, and randomly checks the IN to ascertain if it works properly; and the MNs send the gathered data packets to the CH and evaluate the behaviors of the CH and IN based on their own reputation mechanism. The novelty of our scheme is that in order to take both the safety and the lifespan of a network into consideration, the composite reputation value (CRV) including forwarding rate, detecting malicious nodes, and surplus energy of the node is utilized to select CH and IN under the new suggested network arrangement, and the use of a node\u2019s surplus energy can balance the energy consumption of a node, thereby prolonging the network lifespan. Theoretical analysis and simulation results indicate that the proposed scheme can detect the malicious node accurately and efficiently, so the false alarm rate is lowered by 25.7% compared with Watchdog and the network lifespan is prolonged by 54.84% compared with LEACH (Low Energy Adaptive Clustering Hierarchy).<\/jats:p>","DOI":"10.3390\/s16091537","type":"journal-article","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T10:21:45Z","timestamp":1474366905000},"page":"1537","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["A Security Mechanism for Cluster-Based WSN against Selective Forwarding"],"prefix":"10.3390","volume":"16","author":[{"given":"Hai","family":"Zhou","sequence":"first","affiliation":[{"name":"School of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuanming","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Li","family":"Feng","sequence":"additional","affiliation":[{"name":"School of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daolei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Optoelectronic Information, University of Electronic Science and Technology, Chengdu 610054, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Cho, Y.H., Qu, G., and Wu, Y.M. (2012, January 24\u201325). Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks. Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2012.32"},{"key":"ref_2","first-page":"92","article-title":"Performance Evaluation of Wireless Sensor Network under Black Hole Attack","volume":"1","author":"Gulhane","year":"2014","journal-title":"Int. J. Comput. Technol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1109\/TPDS.2014.2317719","article-title":"Trust Management for Defending On-Off Attacks","volume":"26","author":"Chae","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Lu, Z., Sagduyu, Y., and Li, J. (May, January 26). Queuing the Trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks. Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China.","DOI":"10.1109\/INFOCOM.2015.7218389"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., and Baker, M. (2000, January 6\u201311). Mitigating Routing Misbehavior in Mobile and Ad Hoc Networks. Proceedings of the International Conference on Mobile Computing and Networking (Mobicom), Boston, MA, USA.","DOI":"10.1145\/345910.345955"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Tseng, C.Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., and Levitt, K. (2003, January 31). A Specification-Based Intrusion Detection System for AODV. Proceedings of the the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, USA.","DOI":"10.1145\/986858.986876"},{"key":"ref_8","first-page":"35978","article-title":"Mixed and Continuous Strategy Monitor-Forward Game Based Selective Forwarding Solution in WSN","volume":"2015","author":"Liao","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"237","DOI":"10.4236\/wsn.2014.611023","article-title":"Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN","volume":"6","author":"Hu","year":"2014","journal-title":"Wirel. Sens. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Cui, B., and Yang, S.J. (2014, January 29\u201331). NRE: Suppress Selective Forwarding Attacks in Wireless Sensor Networks. Proceedings of the 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, USA.","DOI":"10.1109\/CNS.2014.6997490"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Stavrou, E., and Pitsillides, A. (2014, January 4\u20138). Recovering from The Attack in WSNs Enhancing The Recovery Benefits of Blacklisting and Rerouting Using Directional Antennas. Proceedings of the 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), Nicosia, Cyprus.","DOI":"10.1109\/IWCMC.2014.6906373"},{"key":"ref_12","unstructured":"Josang, A., and Ismail, R. (2002, January 17\u201319). The Beta Reputation System. Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"3827","DOI":"10.12733\/jics20106084","article-title":"An Energy-balanced Routing Algorithm on Heterogeneous Deployment in WSN","volume":"12","author":"Wang","year":"2015","journal-title":"J. Inf. Comput. Sci."},{"key":"ref_14","first-page":"27","article-title":"Unequal Scaled Clustering Routing for WSN Based on Redundancy of Cluster Headers","volume":"37","author":"Zhang","year":"2011","journal-title":"Comput. Eng."},{"key":"ref_15","first-page":"2230","article-title":"A Kind of Node Distribution Strategy for the Energy Hole Problem of WSNs","volume":"23","author":"Ma","year":"2015","journal-title":"Comput. Meas. Control"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/9\/1537\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:31:18Z","timestamp":1760211078000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/9\/1537"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,20]]},"references-count":15,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2016,9]]}},"alternative-id":["s16091537"],"URL":"https:\/\/doi.org\/10.3390\/s16091537","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2016,9,20]]}}}