An approach to mitigating Sybil attack in wireless networks using ZigBee

被引:0
作者
Lee, Gunhee [1 ]
Lim, Jaesung [1 ]
Kim, Dong-Kyoo [1 ]
Yang, SungHyun [2 ]
Yoon, MyungHyun [3 ]
机构
[1] Ajou Univ, Sch Informat & Commun, Suwon 443749, South Korea
[2] Kwangwoon Univ, Dept Elect Engn, Seoul, South Korea
[3] Korea Elect Technol Inst, Ubiquitous Comp Res Ctr, Seongnam 463816, South Korea
来源
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES | 2008年
关键词
Sybil attack; ZigBee protocol suite; wireless sensor network; security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Various sensors employing ZigBee protocol send environment information to a home gateway. The home gateway manages every devices, sensors and services according to the information. However, if an attacker fabricates the information with malevolent purpose, the system may perform any inadvertent service, which may be harmful to users. Sybil attack is one of serious threats that uses such vulnerability. In this paper, we propose a Sybil attack detection method and its response method to mitigate the effect of the attack in wireless network using ZigBee. The proposed method employs a challenge-response approach. A verifier send a node a request that corresponds to an identity, and the receiver should respond the request properly within threshold time. The performance of the proposed method is reasonable for applying it to the practical networks. This will help the wireless networks using ZigBee to enhance its security.
引用
收藏
页码:1005 / +
页数:2
相关论文
共 9 条
[1]   Routing with guaranteed delivery in ad hoc wireless networks [J].
Bose, P ;
Morin, P ;
Stojmenovic, I ;
Urrutia, J .
WIRELESS NETWORKS, 2001, 7 (06) :609-616
[2]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[3]  
HARDEKOPF B, 2001, 5 WORLD MULT SYST CY
[4]  
Kargl F, 2005, LECT NOTES COMPUT SC, V3313, P152
[5]  
Karp B., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P243, DOI 10.1145/345910.345953
[6]   Location-Aided Routing (LAR) in mobile ad hoc networks [J].
Ko, YB ;
Vaidya, NH .
WIRELESS NETWORKS, 2000, 6 (04) :307-321
[7]   TAG:: a Tiny AGgregation service for ad-hoc sensor networks [J].
Madden, S ;
Franklin, MJ ;
Hellerstein, JM ;
Wei, H .
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, :131-146
[8]  
NEWSOME J, 2004, INT S INFORM PROCESS, V3, P259, DOI DOI 10.1145/984622.984660
[9]  
*ZIGBEE ALL, 2005, ZIGBEE SPEC V1 0