Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes

Mojtaba Jamshidi, Milad Ranjbari, Mehdi Esnaashari, Nooruldeen Nasih Qader, Mohammad Reza Meybodi

Abstract


Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which a malicious node attempts to propagate several fabricated identities. This attack significantly affects routing protocols and many network operations, including voting and data aggregation. The mobility of nodes in mobile wireless sensor networks makes it problematic to employ proposed Sybil node detection algorithms in static wireless sensor networks, including node positioning, RSSI-based, and neighbour cooperative algorithms. This paper proposes a dynamic, light-weight, and efficient algorithm to detect Sybil nodes in mobile wireless sensor networks. In the proposed algorithm, observer nodes exploit neighbouring information during different time periods to detect Sybil nodes. The proposed algorithm is implemented by J-SIM simulator and its performance is compared with other existing algorithm by conducting a set of experiments. Simulation results indicate that the proposed algorithm outperforms other existing methods regarding detection rate and false detection rate. Moreover, they also showed that the mean detection rate and false detection rate of the proposed algorithm are respectively 99% and less than 2%.

Keywords


Wireless sensor networks; Sybil attack; mobile node; observer node.

Full Text:

PDF

References


A. Rathee, R. Singh, and A. Nandini. "Wireless Sensor Network-Challenges and Possibilities." International Journal of Computer Applications, vol. 140, no. 2, 2016.

A. R., Dhakne and P. N. Chatur. "Detailed Survey on Attacks in Wireless Sensor Network." In Proceedings of the International Conference on Data Engineering and Communication Technology, pp. 319-331. Springer Singapore, 2017.

J. R. Douceur, “The Sybil attack”, First International Workshop on Peer-to-Peer Systems (IPTPS ‘02), 2002.

C Karlof. And D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, AdHoc Networks, Vol. 1, No. 2, pp. 299-302, 2003.

A. Ajina, M. K. Nair, “Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication”, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 9, No. 1, 2017.

J. Newsome, E. Shi, D Song. and A. Perrig, “The Sybil attack in sensor networks: analysis and defences”, International Symposium on Information Processing in Sensor Networks, pp. 259–268, 2004.

S. Zhong, L. Li, Y. G. Liu and Y. R. Yang, “Privacy-preserving location based services for mobile users in Wireless Networks”, Technical Report YALEU/DCS/TR-1297, Yale Computer Science, 2004.

M. Demirbas and Y. Song, “An RSSI-based scheme for Sybil attack detection in wireless sensor networks” IEEE Computer Society International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 570–574, 2006.

S. Misra and S. Myneni, “On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI”, IEEE Global Telecommunications Conference (GLOBECOM), pp. 1-4, 2010.

S. Chen, G. Yang, and S. Chen, “A Security Routing Mechanism against Sybil Attack for Wireless Sensor Networks”, International Conference on Communications and Mobile Computing, 2010.

A. Jangra, P. Swati, “Securing LEACH Protocol from Sybil Attack using Jakes Channel Scheme (JCS)”, International Conference on Advances in ICT for Emerging Regions, pp. 79-87, 2011.

WANG X.-D., SUN Y.-Q. and MENG X.-X.: Cluster-based Defending Mechanism for Sybil Attacks in Wireless Sensor Network. Computer Engineering, Vol. 15, 2009.

W. Shi, S. Liu, and Z. Zhang, “A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network”, KSII Transactions on Internet & Information Systems, Vol. 9, No. 9, pp. 3738-3749, 2015.

M. Jamshidi, A. Hannani, M. Esnaashari, and M. R. Meybodi, “Defending Sybil Attack in Wireless Sensor Networks with the aid of Detecting Suspicious Arias in the Network”, 20th Computer Soceity of Iran Annual Conference, University of Mashhad, Mashhad, Iran, 2-4, 2015.

K. F. Ssu, W. T. Wang, and W. C. Chang, “Detecting Sybil attacks in wireless Sensor Networks using neighboring information”, Computer Networks, Vol. 53, No. 18, pp. 3042–3056, 2009.

R. Rafeh, and M. Khodadadi, “Detecting Sybil Nodes in Wireless Sensor Networks Using Two-hop Messages”, Indian Journal of Science and Technology, Vol. 7, No. 9, pp. 1359-1368, 2014.

S. Ramachandran and V. Shanmugan, “Impact of Sybil and Wormhole Attacks in Location based Geographic Multicast Routing Protocol for Wireless Sensor Networks”, Journal of Computer Science, Vol. 7, No. 7, pp. 973-979, 2011.

R. Muraleedharan, X. Ye, and L.A. Osadciw, “Prediction of Sybil Attack on WSN Using Bayesian Network and Swarm Intelligence”, Wireless Sensing and Processing, Orlando, FL, USA, 2008.

S. Sharmila and G. Umamaheswari, "Detection of Sybil attack in mobile wireless sensor networks", International journal of engineering science & advanced technology, Vol. 2, pp. 256 – 262, 2012.

S. Sharmilaa and G. Umamaheswari, “Node ID based detection of Sybil attack in mobile wireless sensor network”, International Journal of Electronics, Vol. 100, No. 10, pp. 1441-1454, 2012.

M. Jamshidi, E. Zangeneh, M. Esnaashari, and M. R. Meybodi, “A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks”, Computers & Electrical Engineering, 64, pp. 220-232.

S. Rupinder, J. Singh, and R Singh, “TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 16, No. 11, 2016.

U. S. Dhamodharan and R. Vayanaperumal, “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method”, The Scientific World Journal, Vol. 1, No. 1, pp. 13-17, 2015.

R. Amuthavalli and R. S. Bhuvaneswaran, “DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD”, Journal of Theoretical & Applied Information Technology, Vol. 67, No. 1, pp.236-246, 2014.

S. Sinha, A. Paul, and S. Pal, “Use of Spline Curve in Sybil Attack Detection based on Received Signal Power-New Approach”, International Journal on Recent Trends in Engineering & Technology, Vol. 11, No. 1, pp. 602-611, 2014.

S. Panagiotis, E. Karapistoli, and A. Economides, “Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information”, Expert Systems with Applications, Vol. 42, No. 21, pp. 7560-7572, 2015.

R.-H. Hu, X.-M. Dong, and D.-L. Wang, “Defense mechanism against node replication attacks and Sybil attacks in wireless sensor networks”, Acta Electronica Sinica, Vol. 43, No. 4, pp. 744-752, 2015.

J-SIM Simulator, https://sites.google.com/site/jsimofficial/, December 25, 2017.

C. M. Yu, C. S. Lu, and S. Y. Kuo, “Mobile Sensor Network Resilient Against Node Replication Attacks”, IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008.




DOI: http://dx.doi.org/10.30630/joiv.2.3.131

Refbacks



Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : hidraamnur@live.com | hidra@pnp.ac.id
              fazrolpnp@gmail.com


Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats