An approach to mitigating Sybil attack in wireless networks using ZigBee

被引:0
作者
Lee, Gunhee [1 ]
Lim, Jaesung [1 ]
Kim, Dong-Kyoo [1 ]
Yang, SungHyun [2 ]
Yoon, MyungHyun [3 ]
机构
[1] Ajou Univ, Sch Informat & Commun, Suwon 443749, South Korea
[2] Kwangwoon Univ, Dept Elect Engn, Seoul, South Korea
[3] Korea Elect Technol Inst, Ubiquitous Comp Res Ctr, Seongnam 463816, South Korea
来源
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES | 2008年
关键词
Sybil attack; ZigBee protocol suite; wireless sensor network; security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Various sensors employing ZigBee protocol send environment information to a home gateway. The home gateway manages every devices, sensors and services according to the information. However, if an attacker fabricates the information with malevolent purpose, the system may perform any inadvertent service, which may be harmful to users. Sybil attack is one of serious threats that uses such vulnerability. In this paper, we propose a Sybil attack detection method and its response method to mitigate the effect of the attack in wireless network using ZigBee. The proposed method employs a challenge-response approach. A verifier send a node a request that corresponds to an identity, and the receiver should respond the request properly within threshold time. The performance of the proposed method is reasonable for applying it to the practical networks. This will help the wireless networks using ZigBee to enhance its security.
引用
收藏
页码:1005 / +
页数:2
相关论文
共 50 条
  • [31] Adaptive link fingerprint authentication scheme against Sybil attack in ZigBee network
    Yu B.
    Huang M.
    Huang Y.
    Kong Z.
    [J]. Huang, Meigen (huang_meigen@163.com), 2016, Science Press (38): : 2627 - 2632
  • [32] Information-theoretic approach for secure localization against sybil attack in wireless sensor network
    Giri, Arindam
    Dutta, Subrata
    Neogy, Sarmistha
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) : 9491 - 9497
  • [33] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    [J]. COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [34] Cod ng Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks
    Sassani , Bahman A.
    Alomirah, Abdulaziz
    Pang, Shaning
    Sarrafpour, Soshian
    [J]. 2021 IEEE 19TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2021), 2021, : 87 - 94
  • [35] A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks
    Dong, Shi
    Zhang, Xin-gang
    Zhou, Wen-gang
    [J]. JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2020, 15 (02) : 919 - 926
  • [36] A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks
    Shi Dong
    Xin-gang Zhang
    Wen-gang Zhou
    [J]. Journal of Electrical Engineering & Technology, 2020, 15 : 919 - 926
  • [37] Similarity-Based and Sybil Attack Defended Community Detection for Social Networks
    Jiang, Zhongyuan
    Li, Jing
    Ma, Jianfeng
    Yu, Philip S.
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3487 - 3491
  • [38] Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack
    Raja, K. Nirmal
    Beno, M. Maraline
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (07)
  • [39] Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks
    Sundararajan, Ranjeeth Kumar
    Arumugam, Umamakeswari
    [J]. JOURNAL OF SENSORS, 2015, 2015
  • [40] Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack
    K. Nirmal Raja
    M. Maraline Beno
    [J]. Journal of Medical Systems, 2017, 41