{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:35:47Z","timestamp":1769150147998,"version":"3.49.0"},"reference-count":44,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"CERNET Innovation Project","award":["NGII20180317"],"award-info":[{"award-number":["NGII20180317"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In cluster-based wireless sensor networks, cluster heads (CHs) gather and fuse data packets from sensor nodes; then, they forward fused packets to the sink node (SN). This helps wireless sensor networks balance energy effectively and efficiently to prolong their lifetime. However, cluster-based WSNs are vulnerable to selective forwarding attacks. Compromised CHs would become malicious and launch selective forwarding attacks in which they drop part of or all the packets from other nodes. In this paper, a data clustering algorithm (DCA) for detecting a selective forwarding attack (DCA-SF) is proposed. It can capture and isolate malicious CHs that have launched selective forwarding attacks by clustering their cumulative forwarding rates (CFRs). The DCA-SF algorithm has been strengthened by changing the DCA parameters (Eps, Minpts) adaptively. The simulation results show that the DCA-SF has a low missed detection rate of 1.04% and a false detection rate of 0.42% respectively with low energy consumption.<\/jats:p>","DOI":"10.3390\/s20010023","type":"journal-article","created":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T03:15:01Z","timestamp":1577070901000},"page":"23","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks"],"prefix":"10.3390","volume":"20","author":[{"given":"Hao","family":"Fu","sequence":"first","affiliation":[{"name":"School of Optoelectronic Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Yinghong","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Optoelectronic Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Zhe","family":"Dong","sequence":"additional","affiliation":[{"name":"School of Optoelectronic Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2927-0034","authenticated-orcid":false,"given":"Yuanming","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Optoelectronic Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1843","DOI":"10.1016\/j.comcom.2010.06.001","article-title":"A Novel Stable Selection and Reliable Transmission Protocol for Clustered Heterogeneous Wireless Sensor Networks","volume":"33","author":"Zhou","year":"2010","journal-title":"Comput. Commun."},{"key":"ref_2","first-page":"33","article-title":"The Diffusion Clustering Scheme and Hybrid Energy Balanced Routing Protocol (DCRP) in Multi-hop Wireless Sensor Networks","volume":"43","author":"Liu","year":"2019","journal-title":"Ad Hoc Sens. Wirel. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1504\/IJSNET.2017.081334","article-title":"An Energy-balanced Loop-free Routing Protocol for Distributed Wireless Sensor Networks","volume":"23","author":"Wu","year":"2017","journal-title":"Int. J. Sens. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1007\/s11277-019-06608-3","article-title":"A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks","volume":"109","author":"Liu","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_5","first-page":"92","article-title":"Performance Evaluation of Wireless Sensor Network under Black Hole Attack","volume":"1","author":"Gulhane","year":"2014","journal-title":"Int. J. Comput. Technol."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Lu, Z., Sagduyu, Y., and Li, J. (May, January 26). Queuing the trust: Secure Backpressure Algorithm against Insider Threats in Wireless Networks. Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u2019 2015), Hong Kong, China.","DOI":"10.1109\/INFOCOM.2015.7218389"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1109\/TPDS.2014.2317719","article-title":"Trust Management for Defending On-Off Attacks","volume":"26","author":"Chae","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Zhou, H., Wu, Y.M., and Feng, L. (2016). A Security Mechanism for Cluster-Based WSN against Selective Forwarding. Sensors, 9.","DOI":"10.3390\/s16091537"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","unstructured":"Chris, K., and David, W. (2003, January 11). Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, USA."},{"key":"ref_11","unstructured":"Semanti, D., and Abhijit, D. (2015, January 19\u201320). An Algorithm to Detect Malicious Nodes in Wireless Sensor Network Using Enhanced LEACH Protocol. Proceedings of the 2015 International Conference on Advances in Computer Engineering and Applications, Ghaziabad, India."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1155\/2018\/8961239","article-title":"A Security Framework for Cluster-Based Wireless Sensor Networks against the Selfishness Problem","volume":"2018","author":"Ishaq","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Tseng, C.Y., Balasubramanyam, P., Ko, C., Limprasittiporn, R., Rowe, J., and Levitt, K. (2003, January 31). A Specification-Based Intrusion Detection System for AODV. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, Fairfax, VA, USA.","DOI":"10.1145\/986858.986876"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Otoum, S., Kantarci, B., and Mouftah, H.T. (2017, January 26\u201330). Mitigating False Negative Intruder Decisions in WSN-based Smart Grid Monitoring. Proceedings of the IEEE 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC\u20192017), Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986278"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., and Baker, M. (2000, January 6\u201311). Mitigating Routing Misbehavior in Mobile and Ad Hoc Networks. Proceedings of the International Conference on Mobile Computing and Networking (Mobicom\u20192000), Boston, MA, USA.","DOI":"10.1145\/345910.345955"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Cho, Y.H., Qu, G., and Wu, Y.M. (2012, January 24\u201325). Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks. Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops (SPW), San Francisco, CA, USA.","DOI":"10.1109\/SPW.2012.32"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Nii, E., Kitanouma, T., Adachi, N., and Takizawa, Y. (2017, January 13\u201316). Cooperative Detection for Falsification and Isolation of Malicious Nodes for Wireless Sensor Networks in Open Environment. Proceedings of the 2017 IEEE Asia Pacific Microwave Conference (APMC 2017), Kuala Lumpur, Malaysia.","DOI":"10.1109\/APMC.2017.8251496"},{"key":"ref_18","unstructured":"Ma, D.Y., and Zhang, A.D. (2004, January 1\u20134). An Adaptive Density-based Clustering Algorithm for Spatial Database with Noise. Proceedings of the 4th IEEE International Conference on Data Mining (ICDM\u20192004), Brighton, UK."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSMCC.2008.923876","article-title":"Random-forests-based Network Intrusion Detection Systems","volume":"38","author":"Zhang","year":"2008","journal-title":"IEEE Trans. Syst. Man Cybern Part C"},{"key":"ref_20","unstructured":"(2019, May 28). Kdd Cup 1999 Data. Available online: https:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/S0306-4379(01)00008-4","article-title":"Cure: An efficient clustering algorithm for large databases","volume":"26","author":"Guha","year":"2001","journal-title":"Inf. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ramakrishnan, R., and Livny, M. (1996, January 4\u20136). Birch: An efficient data clustering method for very large databases. Proceedings of the ACM Sigmod Record, Montreal, QC, Canada.","DOI":"10.1145\/233269.233324"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/s11222-007-9033-z","article-title":"A tutorial on spectral clustering","volume":"17","author":"Ulrike","year":"2007","journal-title":"Stat. Comput."},{"key":"ref_24","unstructured":"Wang, W., Yang, J., and Muntz, R. (1997, January 25\u201329). Sting: A statistical information grid approach to spatial data mining. Proceedings of the VLDB, Athens, Greece."},{"key":"ref_25","unstructured":"MacQueen, J. (1967). Some Methods for Classification and Analysis of Multivariate Observations. Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, UC Press."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3336","DOI":"10.1016\/j.eswa.2008.01.039","article-title":"A Simple and Fast Algorithm for K-medoids Clustering","volume":"36","author":"Park","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1126\/science.1242072","article-title":"Clustering by Fast Search and Find of Density Peaks","volume":"344","author":"Rodriguez","year":"2014","journal-title":"Science"},{"key":"ref_28","first-page":"638","article-title":"Improved Rival Penalized Competitive Learning algorithm based on sample spatial distribution density","volume":"32","author":"Xie","year":"2012","journal-title":"J. Comput. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/72.238318","article-title":"Rival Penalized Competitive Learning for Clustering Analysis, RFB Net, and Curve Detection","volume":"4","author":"Xu","year":"1993","journal-title":"IEEE Trans. Neural Netw."},{"key":"ref_30","unstructured":"Kaufman, L., and Rousseeuw, P.J. (1987). Clustering by means of medoids. Statistical Data Analysis Based on the L Norm, Elsevier."},{"key":"ref_31","unstructured":"Dhillon, I., Guan, Y., and Kogan, J. (2002, January 13). Refining Clusters in High Dimensional Text data. Proceedings of the 2nd SIAM Workshop on Clustering High Dimensional Data, Arlington, TX, USA."},{"key":"ref_32","unstructured":"Theodoridis, S., and Koutroumbas, K. (2009). Pattern Recognition, Academic Press. [4th ed.]."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.ins.2018.03.031","article-title":"Shared-nearest-neighbor-based clustering by fast search and find of density peaks","volume":"450","author":"Liu","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_34","first-page":"1400","article-title":"EDDPC: An Efficient Distributed Density Peaks Clustering Algorithm","volume":"53","author":"Gong","year":"2016","journal-title":"J. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chenny, S., and Yu, G. (2017, January 19\u201322). Efficient Distributed Density Peaks for Clustering Large Data Sets in Mapreduce. Proceedings of the IEEE International Conference on Data Engineering, San Diego, CA, USA.","DOI":"10.1109\/ICDE.2017.40"},{"key":"ref_36","unstructured":"Martin, E., Hans-Peter, K., Joerg, S., and Xu, X.W. (1996, January 2\u20134). A Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (ICKDDM\u2019 1996), Warsaw, Portland."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Liu, P., Zhou, D., and Wu, D. (2007, January 9\u201311). VDBSCAN: Varied Density Based Spatial Clustering of Applications with Noise. Proceedings of the IEEE 4th International Conference on Service Systems and Service Management (ICSSSM\u2019 2007), Chengdu, China.","DOI":"10.1109\/ICSSSM.2007.4280175"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Khan, K., Rehman, S.U., Aziz, K., Fong, S., and Sarasvady, S. (2014, January 17\u201319). DBSCAN: Past, Present and Future. Proceedings of the IEEE 4th International Conference on the Applications of Digital Information and Web Technologies(ICADIWT 2014), Chennai, India.","DOI":"10.1109\/ICADIWT.2014.6814687"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Berkin, P. (2006). Survey of Clustering Data Mining Techniques. Grouping Multidimensional Data, Springer.","DOI":"10.1007\/3-540-28349-8_2"},{"key":"ref_40","first-page":"1","article-title":"Choosing DBSCAN Parameters Automatically Using Differential Evolution","volume":"91","author":"Karami","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref_41","unstructured":"Borah, B., and Bhattacharyya, D.K. (2004, January 4\u20137). An Improved Sampling-based DBSCAN for Large Spatial Databases. Proceedings of the IEEE International Conference on Intelligent Sensing and Information Processing (ICISIP\u20192004), Chennai, India."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Gan, J.H., and Tao, Y.F. (June, January 31). DBSCAN Revisited: Mis-Claim, Un-Fixability, and Approximation. Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data (SIGMOD 2015), Melbourne, Australia.","DOI":"10.1145\/2723372.2737792"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.patcog.2018.05.030","article-title":"A Fast Clustering Algorithm Based on Pruning Unnecessary Distance Computations in DBSCAN for High-Dimensional Data","volume":"83","author":"Chen","year":"2018","journal-title":"Pattern Recognit."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"237","DOI":"10.4236\/wsn.2014.611023","article-title":"Detection of Insider Selective Forwarding Attack Based on Monitor Node and Trust Mechanism in WSN","volume":"6","author":"Hu","year":"2014","journal-title":"Wirel. Sens. Netw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/1\/23\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:43:35Z","timestamp":1760190215000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/1\/23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,19]]},"references-count":44,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1]]}},"alternative-id":["s20010023"],"URL":"https:\/\/doi.org\/10.3390\/s20010023","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,19]]}}}