Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks

被引:11
|
作者
Almesaeed, Reham [1 ]
Al-Salem, Eman [2 ]
机构
[1] Univ Bahrain, Dept Comp Engn, Commun Syst & Network Grp, Zallaq, Bahrain
[2] Univ Bahrain, Coll Informat Technol, Zallaq, Bahrain
关键词
Wireless sensor networks; Routing protocols; Sybil attack; Security; Energy;
D O I
10.1007/s11276-021-02871-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The detection of sybil attack is one of the main security challenges in wireless sensor networks (WSNs). The attack is considered as one of the risky threats since an attacker can generate multiple fake identities with false messages to severely impair the normal operation of WSNs. This study proposes a novel sybil attack detection method referred to as CPPR, based on the wireless channel profile and the regulation of transmission power at the sensor nodes. The proposed CPPR mechanism can benefit from the advances in the physical layer at the sensor nodes to regulate their transmission power to prevent many attacks and maintain high detection ratio. The CPPR can also provide low operational overhead and energy consumption. The proposed scheme is shown to provide an average of 95% detection ratio despite the number of sybil nodes in the network.
引用
收藏
页码:1361 / 1374
页数:14
相关论文
共 50 条
  • [21] A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks
    Banerjee, Satyajit
    Mukhopadhyay, Debapriyay
    Roy, Suman
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 562 - 572
  • [22] The Sybil attack in sensor networks: Analysis & defenses
    Newsome, J
    Shi, E
    Song, D
    Perrig, A
    IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2004, : 259 - 268
  • [23] Cloud-based Sybil Attack Detection Scheme for Connected Vehicles
    Anwar, Anika
    Halabi, Talal
    Zulkernine, Mohammad
    2019 3RD CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2019,
  • [24] Location verification based defense against sybil attack in sensor networks
    Mukhopadhyay, Debapriyay
    Saha, Indranil
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 509 - 521
  • [25] A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network
    Shi, Wei
    Liu, Sanyang
    Zhang, Zhaohui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (09): : 3738 - 3750
  • [26] A Secure Positioning Algorithm against Sybil Attack in Wireless Sensor Networks Based on Number Allocating
    Tang, Qing
    Wang, Jian
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 932 - 936
  • [27] A Novel Sybil Attack Detection Mechanism for Mobile IoT Networks
    Dogan-Tusha, Seda
    Althunibat, Saud
    Qaraqe, Marwa
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1838 - 1843
  • [28] Detection of Masked Replication Attack in Wireless Sensor Networks
    Khan, Wazir Zada
    Aalsalem, Mohammed Y.
    Saad, Mohamad Naufal Mohamad
    PROCEEDINGS OF THE 2013 8TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2013), 2013,
  • [29] A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network
    Jan, Mian Ahmad
    Nanda, Priyadarsi
    He, Xiangjian
    Liu, Ren Ping
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 318 - 325
  • [30] Defending Sybil attacks based on neighboring relations in wireless sensor networks
    Wang, Wei-Tong
    Ssu, Kuo-Feng
    Chang, Wen-Chung
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (05) : 408 - 420