Sybil Attack Detection Based on RSSI for Wireless Sensor Network

被引:32
作者
Wang, Jiangtao [1 ]
Yang, Geng [1 ]
Sun, Yuan [1 ]
Chen, Shengshou [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Res Inst Comp Technol, Coll Comp, Nanjing, Peoples R China
来源
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15 | 2007年
关键词
Wireless sensor network; Intrusion detection; Sybil attack; Received signal strength indication;
D O I
10.1109/WICOM.2007.667
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper we propose a new method of Sybil attack detection in Wireless Sensor Network (WSN) based on received signal strength indication (RSSI). This method establishes Jakes channel model by emulating real network space situation of WSN. At the same time, it judges Sybil Attack from both the received signal's strength of nodes and the status messages of member nodes which are accumulated in head nodes synthetically. Consequently, two ways were proposed to check, and raise the efficiency and refinement of Sybil attack on head nodes and member nodes. The method achieves the preferable detection rate and offers a wide range of applications.
引用
收藏
页码:2684 / 2687
页数:4
相关论文
共 9 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]   Computational puzzles as Sybil defenses [J].
Borisov, Nikita .
SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2006, :171-176
[3]  
Li XL, 2005, 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, P557
[4]   The simulation of independent Rayleigh faders [J].
Li, YX ;
Huang, XJ .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2002, 50 (09) :1503-1514
[5]  
LIU D, 2005, ACM T INFORM SYSTEM, V8, P41, DOI DOI 10.1145/1053283
[6]  
MURAT D, 2006, WORLD WIR MOB MLT NE, P564
[7]  
Newsome J, 2004, IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P259
[8]  
SHENG Z, 2004, YALEUDCSTR1297
[9]  
Zhang QH, 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, P185