Browse > Article
http://dx.doi.org/10.6109/ijice.2011.9.6.676

Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks  

Seo, Hwa-Jeong (Department of Computer Engineering, Pusan National University)
Kim, Ho-Won (Department of Computer Engineering, Pusan National University)
Abstract
Sybil attack can disrupt proper operations of wireless sensor network by forging its sensor node to multiple identities. To protect the sensor network from such an attack, a number of countermeasure methods based on RSSI (Received Signal Strength Indicator) and LQI (Link Quality Indicator) have been proposed. However, previous works on the Sybil attack detection do not consider the fact that Sybil nodes can change their RSSI and LQI strength for their malicious purposes. In this paper, we present a Sybil attack detection method based on a transmission power range. Our proposed method initially measures range of RSSI and LQI from sensor nodes, and then set the minimum, maximum and average RSSI and LQI strength value. After initialization, monitoring nodes request that each sensor node transmits data with different transmission power strengths. If the value measured by monitoring node is out of the range in transmission power strengths, the node is considered as a malicious node.
Keywords
Sybil Attack; Wireless Sensor Network; Reduced Signal Strength Indicator; Link Quiality Indicator; Transmission power;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Shaohe, W. Xiaodong, Z. Xin, Z. Xingming, Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks, Computational Intelligence and Security, 2008. CIS '08. International Conference on, (2008), 442-446.
2 ChipCon Inc. http://www.chipcon.com
3 J.L. Hill, D.E. Culler, Mica: A wireless platform for deeply embedded networks,IEEE Micro 22 (6) (2002) 12-24.   DOI   ScienceOn
4 M. Corporation, Tmote sky:Ultra low power IEEE 802.15.4 compliant wireless sensor module data sheet, (2006).
5 G.Zhou, T.He, S. Krishnamurthy, and J. A. Stankovic. Impact of radio irregularity on wireless sensor networks., In MobiSys '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, (2004), 125-138
6 TinyOS, http://www.tinyos.net/
7 R.-H. Wu, Y.-H. Lee, H.-W. Tseng, Y.-G. Jan, and M.-H. Chuang, Study of characteristics of rssi signal, in Industrial Technology, 2008. ICIT 2008. IEEE International Conference on, (2008), 1-3.
8 M. Demirbas and Y. Song., An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks., International Symposium on a World of Wireless, Mobile and Multimedia Networks, (2006), 564-570.
9 J. R. Douceur., The sybil attack, In IPTPS '01:Revised Papers from the First International Workshop on peer-to-peer systems, (2002), 251-260.
10 Fereshteh Amini, Jelena Mišic, and Hossein Pourreza., Detection of Sybil attack in beacon enabled IEEE 802.15.4 Networks., Wireless Communications and Mobile Computing Conference, 2008. IWCMC'08. International, (2008), 1058-1063.
11 A. Nasipuri and K. Li, A directionality based location discovery scheme for wireless sensor networks, in WSNA '02: Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications. (2002), 105-111
12 T. Karalar and J. Rabaey., An rf tof based ranging implementation for sensor networks, in Communications, 2006. ICC '06. IEEE International Conference on, (2006), 3347-3352
13 S. Gezici, Z. Tian, G. Giannakis, H. Kobayashi, A. Molisch, H. Poor, and Z. Sahinoglu, Localization via ultra-wideband radios: a look at positioning aspects for future sensor networks, Signal Processing Magazine, IEEE, (2005), 70-84.