An approach to mitigating Sybil attack in wireless networks using ZigBee

被引:0
作者
Lee, Gunhee [1 ]
Lim, Jaesung [1 ]
Kim, Dong-Kyoo [1 ]
Yang, SungHyun [2 ]
Yoon, MyungHyun [3 ]
机构
[1] Ajou Univ, Sch Informat & Commun, Suwon 443749, South Korea
[2] Kwangwoon Univ, Dept Elect Engn, Seoul, South Korea
[3] Korea Elect Technol Inst, Ubiquitous Comp Res Ctr, Seongnam 463816, South Korea
来源
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES | 2008年
关键词
Sybil attack; ZigBee protocol suite; wireless sensor network; security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Various sensors employing ZigBee protocol send environment information to a home gateway. The home gateway manages every devices, sensors and services according to the information. However, if an attacker fabricates the information with malevolent purpose, the system may perform any inadvertent service, which may be harmful to users. Sybil attack is one of serious threats that uses such vulnerability. In this paper, we propose a Sybil attack detection method and its response method to mitigate the effect of the attack in wireless network using ZigBee. The proposed method employs a challenge-response approach. A verifier send a node a request that corresponds to an identity, and the receiver should respond the request properly within threshold time. The performance of the proposed method is reasonable for applying it to the practical networks. This will help the wireless networks using ZigBee to enhance its security.
引用
收藏
页码:1005 / +
页数:2
相关论文
共 50 条
[41]   Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack [J].
K. Nirmal Raja ;
M. Maraline Beno .
Journal of Medical Systems, 2017, 41
[42]   Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network [J].
Ren Xiu-li ;
Yang Wei .
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, :4569-4572
[43]   A Survey of Sybil Attack Countermeasures in Underwater Sensor and Acoustic Networks [J].
Zukarnain, Zuriati Ahmad ;
Amodu, Oluwatosin Ahmed ;
Wenting, Cui ;
Bukar, Umar Ali .
IEEE ACCESS, 2023, 11 :64518-64543
[44]   Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners [J].
Swathi, P. ;
Modi, Chirag ;
Patel, Dhiren .
2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
[45]   Sybil Attack Detection Based on Signal Clustering in Vehicular Networks [J].
Tulay, Halit Bugra ;
Koksal, Can Emre .
IEEE TRANSACTIONS ON MACHINE LEARNING IN COMMUNICATIONS AND NETWORKING, 2024, 2 :753-765
[46]   Sybil Attack Detection Technique Using Session Key Certificate in Vehicular Ad Hoc Networks [J].
Reddy, D. Srinivas ;
Bapuji, V. ;
Govardhan, A. ;
Sarma, S. S. V. N. .
2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
[47]   Detecting and preventing Sybil attacks in wireless sensor networks [J].
Wadii, Jlassi ;
Rim, Haddad ;
Ridha, Bouallegue .
2019 IEEE 19TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS 2019), 2019,
[48]   Isolation of Sybil Attack in VANET using Neighboring Information [J].
Saggi, Mandeep Kaur ;
Kaur, Ranjeet .
2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, :33-38
[49]   Sybil Attack Detection in VANETs Using CatBoost Classifier [J].
Fdil, E. L. Mehdi ;
Souidi, E. L. Mamoun .
INTELLIGENT COMPUTING, VOL 4, 2024, 2024, 1019 :428-437
[50]   A DEFENSIVE TIMESTAMP APPROACH TO DETECT AND MITIGATE THE SYBIL ATTACK IN VANET [J].
Sharma, Shikha ;
Sharma, Shivani .
PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, :386-389