Detecting Sybil attacks in Wireless Sensor Networks using neighboring information

被引:74
作者
Ssu, Kuo-Feng [1 ]
Wang, Wei-Tong [1 ]
Chang, Wen-Chung [1 ]
机构
[1] Natl Cheng Kung Univ, Dept Elect Engn, Tainan 70101, Taiwan
关键词
Wireless Sensor Networks; Security; Sybil attacks;
D O I
10.1016/j.comnet.2009.07.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, the need for network security has become a critical concern. In a Sybil attack, the WSN is subverted by a malicious node which forges a large number of fake identities in order to disrupt the network's protocols. In attempting to protect WSNs against such an attack, this paper develops a scheme in which the node identities are verified simply by analyzing the neighboring node information of each node. The analytical results confirm the efficacy of the approach given a sufficient node density within the network. The simulation results demonstrate that for a network in which each node has an average of 9 neighbors, the scheme detects 99% of the Sybil nodes with no more than a 4% false detection rate. The experiment result shows that the Sybil nodes can still be identified when the links are not symmetric. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:3042 / 3056
页数:15
相关论文
共 21 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
[Anonymous], 2003, Proceedings of the 10th ACM conference on Computer and communications security
[3]  
*BLOODS, 2008, BLOODS DEV C
[4]  
Demirbas Murat., 2006, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, P564
[5]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[6]  
HUANG SK, 2004, P INT COMP S DEC, P966
[7]  
Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
[8]  
Lin S., 2006, SENSYS 06, P223, DOI DOI 10.1145/1182807.1182830
[9]  
Meng J, 2008, IEEE INT WORK GENOM, P18
[10]   Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence [J].
Muraleedharan, Rajani ;
Ye, Xiang ;
Osadciw, Lisa Ann .
WIRELESS SENSING AND PROCESSING III, 2008, 6980