Research Article

Intrusion Detection Algorithm Based on Change Rates of Multiple Attributes for WSN

Table 3

Characteristics and impacts of simulated attacks.

Simulated attacksCharacteristicsImpacts

Hello flooding attacksThe attacker uses a high-power transmitter to broadcast and send Hello packets every round, so that each node of the network mistakes the attacker for its neighbor node.The energy consumption of the attacked node will increase rapidly. The proportion of Hello packets will increase significantly, and proportion of other data packets will decrease.
Selective forwarding attacksThe attacked nodes probabilistically forward or drop specific packets. It has a significant impact on the node with forwarding function.The proportion of sending and receiving packets of the forwarding node will change. The forwarding rate of the node will decrease.
DoS attacksThe attacker interferes with or controls user data, causing refusal of service on correct data transmission.The sending rate and forwarding rate of the attacked node will be significantly reduced.
Sinkhole attacksThe attacker uses his powerful features to make himself more like a base station, so it can receive more data.The number of packages received by the attacked nodes suddenly increases, and the energy is rapidly reduced due to collection.
Multiple attacksThe Hello flooding attacks, Selective forwarding attacks, DoS attacks, and Sinkhole attacks exist simultaneously.A combination of the impacts of the above four kinds of attacks.