Sybil Attack Detection In Wireless Sensor Networks

被引:1
作者
Zhukabayeva, T. K. [1 ]
Mardenov, E. M. [1 ]
Abdildaeva, A. A. [1 ]
机构
[1] Eurasian Natl Univ, Inst Informat & Computat Technol, Nur Sultan, Kazakhstan
来源
2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020) | 2020年
关键词
Wireless Sensor Network; Sybil attack; attack detection; security attacks; defense mechanism; special network;
D O I
10.1109/AICT50176.2020.9368790
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
There are many vulnerabilities to attack in wireless sensor networks. Among them, the sybil attack is especially malicious to generate many false nodes and enter false information on the network. They are detrimental to many functions of the FSU, such as data pooling, fair distribution of resources, etc. Therefore, it is crucial to protect and detect Sybil attacks. The Sybil attack has a significant impact on network performance, and once it was detected, network performance will be obviously improving. In this article, we consider a new method of detecting Sybil attacks using random keys. In the proposed method, signs are used that there is a weak connection between the group of normal nodes and the group of false nodes. Experiment results show that the proposed method detects a false node with a probability of more than 90% with a small energy consumption.
引用
收藏
页数:6
相关论文
共 21 条
[1]  
Almas-Shehni Rezvan, 2017, FUTURE INTERNET, V10, P1, DOI [10.3390/fi10010001, DOI 10.3390/FI10010001]
[2]  
Balachandran Nitish, 2012, INT J ADV NETWORKING, V4
[3]  
Dhamodharan Udaya Suriya Raj Kumar, 2015, ScientificWorldJournal, V2015, P841267, DOI 10.1155/2015/841267
[4]  
Efimenko M. S., 2018, YOUNG SCI, V4042
[5]  
Grover J, 2016, INT CONF RELI INFO, P397, DOI 10.1109/ICRITO.2016.7784988
[6]   Multivariate verication for sybil attack detection in VANET [J].
Grover, Jyoti ;
Gaur, Manoj Singh ;
Laxmi, Vijay .
OPEN COMPUTER SCIENCE, 2015, 5 (01) :60-78
[7]   A precise algorithm for detecting malicious sybil nodes in mobile wireless sensor networks [J].
Jamshidi, Mojtaba ;
Darwesh, Aso Mohammad ;
Lorenc, Augustyn ;
Ranjbari, Milad ;
Meybodi, Mohammad Reza .
IEIE Transactions on Smart Processing and Computing, 2018, 7 (06) :457-466
[8]   A Sybil attack detection scheme for a forest wildfire monitoring application [J].
Jan, Mian Ahmad ;
Nanda, Priyadarsi ;
He, Xiangjian ;
Liu, Ren Ping .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :613-626
[9]   Secure routing in wireless sensor networks: Attacks and countermeasures [J].
Karlof, C ;
Wagner, D .
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, 2003, :113-127
[10]   Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature [J].
Lim, JongBeom ;
Yu, HeonChang ;
Gil, Joon-Min .
SYMMETRY-BASEL, 2017, 9 (03)