A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network

被引:12
作者
Shi, Wei [1 ]
Liu, Sanyang [1 ]
Zhang, Zhaohui [1 ]
机构
[1] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Wireless Sensor Network; Sybil attack; LEACH protocol; RSSI-ID table;
D O I
10.3837/tiis.2015.09.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Sybil attack is a special kind of attack which is difficult to be detected in Wireless Sensor Network (WSN). So a lightweight detection mechanism based on LEACH-RSSI-ID (LRD) is proposed in this paper. Due to the characteristic of Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol, none of nodes can be the cluster head forever. Meanwhile, in order to consume less energy, both factors which are called the remaining energy of nodes and relative density of nodes are taken into account. Therefore, Sybil attack can be found by analyzing the RSSI-ID tables. Different from the previous detection methods, even though Sybil attack occurs in the initialization phase, the malicious nodes can be detected by sink node. What's more, when each malicious node frequently changes identification, it will be detected in a short time. Through the simulations, it is revealed that the LRD mechanism can detect the Sybil attack with high detection rate and accuracy.
引用
收藏
页码:3738 / 3750
页数:13
相关论文
共 18 条
[1]  
[Anonymous], 2012, INT J DISTRIBUTED SE
[2]  
[Anonymous], AD HOC NETW, DOI DOI 10.1016/S1570-8705(03)00008-8
[3]  
Demirbas Murat., 2006, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, P564
[4]  
Heinzelman W. R., 2000, P 33 ANN HAW INT C S, P10, DOI DOI 10.1109/HICSS.2000.926982
[6]  
Ho Jun-Won, 2011, DEPENDABLE SECURE CO, V9, P494
[7]  
Jiuqiang Xu, 2010, Wireless Sensor Network, V2, P606, DOI 10.4236/wsn.2010.28072
[8]   Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks [J].
Jo, Minho ;
Han, Longzhe ;
Kim, Dohoon ;
In, Hoh Peter .
IEEE NETWORK, 2013, 27 (03) :46-50
[9]   A Regional Statistics Detection Scheme against Sybil Attacks in WSNs [J].
Li, Mingxi ;
Xiong, Yan ;
Wu, Xuangou ;
Zhou, Xianchun ;
Sun, Yuhui ;
Chen, Shenpei ;
Zhu, Xiaoya .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :285-291
[10]  
Najafabadi SG, 2013, SMART GRID CONF SGC, P273, DOI 10.1109/SGC.2013.6733831