Browse > Article
http://dx.doi.org/10.7236/JIIBC.2013.13.1.115

Sybil Attack Detection with Energy Efficiency in Wireless Sensor Networks  

Heo, Junyoung (Dept. of Computer Engineering, Hansung University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.13, no.1, 2013 , pp. 115-120 More about this Journal
Abstract
There are lots of vulnerability and chance to be attacked in wireless sensor networks, which has many applications. Among those attacks, sybil attack is to generate a lot of false node and to inject false information into networks. When a user uses such false information without recognizing the attack, there might be a disaster. Although authentication method can be used to protect such attack, the method is not a good choice in wireless sensor networks, where sensor nodes have a limited battery and low power. In this paper, we propose a novel method to detect sybil attack with a little extra overhead. The proposed method use the characteristics that there is a weak connection between a group of normal nodes and a group of false nodes. In addition, the method uses energy aware routing based on random routing and adds a little information into the routing. Experimental results show that the proposed method detects false node by more than 90% probability with a little energy overhead.
Keywords
센서 네트워크;시빌 공격;에너지 고려 라우팅;랜덤 라우팅;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Q. Zhang, P. Wang, D. Reeves, and P. Ning, Defending against Sybil Attacks in Sensor Networks, in proc. of IEEE international conference on distributed computing systems workshops, pp. 185-191, 2005.
2 John R. Douceur, The Sybil Attack, in proc. of 1st international workshop on peer-to-peer systems, pp. 251-260, 2002.
3 A. Pathan, H. Lee, and Choong Seon Hong, Security in wireless sensor networks: issues and challenges, in proc. of the 8th international conference on advanced communication technology, pp. 1043-1048, 2006.
4 J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, in proc. of the 3rd international symposium on information processing in sensor networks, pp. 259-268, 2004.
5 J. Yang, Y. Chen, and W. Trappe, Detecting sybil attacks in wireless and sensor networks using cluster analysis, Mobile Ad Hoc and Sensor Systems (MASS 2008), pp. 834-839, 2008.
6 H. Yu, M. Kaminsky, P. B. Gibbons, and Abraham Flaxman, Sybilguard: defending against Sybil attacks via social networks, in proc. of the conference on applications, technologies, architectures, and protocols for computer communications, pp. 267- 278, 2006.
7 Shah, R., Rabaey, J. "Energy aware routing for low energy ad hoc sensor networks," Proc. of IEEE Wireless Communications and Networking Conference(WCNC), 2002.
8 X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: a library for parallel simulation of large-scale wireless networks," ACM SIGSIM Simulation Digest, vol. 28, no. 1, pp. 154-161, 1998.   DOI
9 I. S. Choi, Y. W. Cha, C. H. Kim, I. K. Cho, "Design and Implementation of Management Protocol and Web Services for Sensor Network", Journal of Korean Institute of Information Technology, vol 9, issue 7, pp. 93-104, Jul 2011
10 S. K. Sung, "A Study on the Activation Technique of Detection nodes for Intrusion Detection in Wireless Sensor Networks", Journal of the Korea Academia-Industrial cooperation Society, v.12, no.11, pp. 5238-5244, 2011   과학기술학회마을   DOI   ScienceOn