Browse > Article
http://dx.doi.org/10.3837/tiis.2015.09.025

A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network  

Shi, Wei (School of Mathematics and Statistics, Xidian University)
Liu, Sanyang (School of Mathematics and Statistics, Xidian University)
Zhang, Zhaohui (School of Mathematics and Statistics, Xidian University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.9, 2015 , pp. 3738-3750 More about this Journal
Abstract
Sybil attack is a special kind of attack which is difficult to be detected in Wireless Sensor Network (WSN). So a lightweight detection mechanism based on LEACH-RSSI-ID (LRD) is proposed in this paper. Due to the characteristic of Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol, none of nodes can be the cluster head forever.
Keywords
Wireless Sensor Network; Sybil attack; LEACH protocol; RSSI-ID table;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kai Xing, Shyaam Sundhar Rajamadam Srinivasan, Major Jose "Manny" Rivera, Jiang Li, Xiuzhen Cheng, "Attacks and countermeasures in sensor networks: A survey," Network Security, pp: 251-272, June 12, 2010. Article (CrossRef Link)
2 Chris Karlof, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2–3, pp: 293-315, September, 2003. Article (CrossRef Link)   DOI
3 Liang Xiao, Greenstein, L.J., Mandayam, Narayan B., Trappe, W., “Channel-based detection of Sybil attacks in wireless networks,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp: 492-503, July, 2009. Article (CrossRef Link)   DOI
4 Qinghua Zhang, Wang, P., Reeves, D.S., Peng Ning, “Defending against Sybil attacks in sensor networks,” 25th IEEE International Conference on Distributed Computing Systems Workshops, pp: 185–191, June 6-10, 2005. Article (CrossRef Link)
5 N. Tran, J. Li, L. Subramanian, S. S. M. Chow, "Brief announcement: improving social-network-based Sybil-resilient node admission control," in Proc. of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, pp: 241-242, 2010. Article (CrossRef Link)
6 M. Demirbas and Y. Song, "An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks," in Proc. of 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06), pp: 564-570, 2006. Article (CrossRef Link)
7 Mingxi Li, Yan Xiong, Xuangou Wu, Xiancun Zhou, Yuhui Sun, Shenpei Chen, and Xiaoya Zhu, "A regional statistics detection scheme against Sybil attacks in WSNs," in Proc. of The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), pp: 285-291, July 16-18, 2013. Article (CrossRef Link)
8 Golestani Najafabadi, S., Naji, H.R., and A. Mahani, "Sybil Attack Detection: Improving Security of WSNs for Smart Power Grid Application," in Proc. of 2013 Smart Grid Conference (SGC), pp: 273-278, December 17-18, 2013. Article (CrossRef Link)
9 P. R. Vamsi and K. Kant, "A Lightweight Sybil Attack Detection Framework for Wireless Sensor Networks," in Proc. of Contemporary Computing (IC3), 2014 Seventh International Conference on, pp: 387-393, August 7-9, 2014. Article (CrossRef Link)
10 S.S. Chen, G. Yang, "A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks," in Proc. of Communications and Mobile Computing (CMC), 2010 International Conference on, vol. 1, pp: 142-146, April 12-14, 2010. Article (CrossRef Link)
11 Minho Jo, Longzhe Han, Dohoon Kim, and Hoh Peter In, “Selfish Attacks and Detection in Cognitive Radio Ad-hoc Networks,” IEEE Network, vol.27, no. 3, pp. 46-50, June 2013. Article (CrossRef Link)   DOI
12 Jun-Won Ho, Wright, M., Das, S.K., “Zonetrust: fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing,” Dependable and Secure Computing, IEEE Transactions on, vol. 9, no. 4, pp: 494-511, December 27, 2011. Article (CrossRef Link)   DOI
13 Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H., "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," in Proc. of the 33rd Annual Hawaii International Conference on System Sciences, January 4-7, 2000. Article (CrossRef Link)
14 Yide Liu. “Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges,” International Journal of Distributed Sensor Networks (IJDSN), pp: 1-8, July 16, 2012. Article (CrossRef Link)
15 Zied Trifa, Maher Khemakhem, “Sybil Nodes as a Mitigation Strategy against Sybil Attack,” Procedia Computer Science, vol. 32, pp: 1135 – 1140, June 5, 2014. Article (CrossRef Link)   DOI
16 Jiuqiang Xu, Wei Liu, Fenggao Lang, Yuanyuan Zhang, Chenglong Wang, “Distance measurement model based on RSSI in WSN,” Wireless Sensor Network, vol. 2, no. 8, pp: 606-611, 2010. Article (CrossRef Link)   DOI
17 Jun-Won Ho, “Sequential hypothesis testing based approach for replica cluster detection in wireless sensor networks,” Journal of Sensor and Actuator Networks, vol. 1, no. 2, pp: 153–165, September 5, 2012. Article (CrossRef Link)   DOI
18 Wei, Yawen and Guan, Yong, “Lightweight location verification algorithms for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 5, pp: 938–950, March, 2013. Article (CrossRef Link)   DOI