An approach to mitigating Sybil attack in wireless networks using ZigBee

被引:0
|
作者
Lee, Gunhee [1 ]
Lim, Jaesung [1 ]
Kim, Dong-Kyoo [1 ]
Yang, SungHyun [2 ]
Yoon, MyungHyun [3 ]
机构
[1] Ajou Univ, Sch Informat & Commun, Suwon 443749, South Korea
[2] Kwangwoon Univ, Dept Elect Engn, Seoul, South Korea
[3] Korea Elect Technol Inst, Ubiquitous Comp Res Ctr, Seongnam 463816, South Korea
来源
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES | 2008年
关键词
Sybil attack; ZigBee protocol suite; wireless sensor network; security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Various sensors employing ZigBee protocol send environment information to a home gateway. The home gateway manages every devices, sensors and services according to the information. However, if an attacker fabricates the information with malevolent purpose, the system may perform any inadvertent service, which may be harmful to users. Sybil attack is one of serious threats that uses such vulnerability. In this paper, we propose a Sybil attack detection method and its response method to mitigate the effect of the attack in wireless network using ZigBee. The proposed method employs a challenge-response approach. A verifier send a node a request that corresponds to an identity, and the receiver should respond the request properly within threshold time. The performance of the proposed method is reasonable for applying it to the practical networks. This will help the wireless networks using ZigBee to enhance its security.
引用
收藏
页码:1005 / +
页数:2
相关论文
共 50 条
  • [1] Sybil Attack Detection In Wireless Sensor Networks
    Zhukabayeva, T. K.
    Mardenov, E. M.
    Abdildaeva, A. A.
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020), 2020,
  • [2] Survey on sybil attack defense mechanisms in wireless ad hoc networks
    Vasudeva, Amol
    Sood, Manu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 120 : 78 - 118
  • [3] Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 698 - 702
  • [4] Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
    Singh, Surinder
    Saini, Hardeep Singh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 190 - 193
  • [5] A Three-tier Scheme for Sybil Attack Detection in Wireless Sensor Networks
    Wang, Hui
    Ma, Li
    Bai, Hong-ying
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2020), 2020, : 752 - 756
  • [6] Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    2015 IEEE 12TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2015, : 91 - 95
  • [7] A New Algorithm to Defend Against Sybil Attack in Static Wireless Sensor Networks Using Mobile Observer Sensor Nodes
    Jamshidi, Mojtaba
    Ranjbari, Milad
    Esnaashari, Mehdi
    Darwesh, Aso Mohammad
    Meybodi, Mohammad Reza
    AD HOC & SENSOR WIRELESS NETWORKS, 2019, 43 (3-4) : 213 - 238
  • [8] Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
    Almesaeed, Reham
    Al-Salem, Eman
    WIRELESS NETWORKS, 2022, 28 (04) : 1361 - 1374
  • [9] The Sybil attack in sensor networks: Analysis & defenses
    Newsome, J
    Shi, E
    Song, D
    Perrig, A
    IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2004, : 259 - 268
  • [10] Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
    Reham Almesaeed
    Eman Al-Salem
    Wireless Networks, 2022, 28 : 1361 - 1374