Using One-hop and Two-hop Neighbouring Information to Defend Against Sybil Attacks in Stationary Wireless Sensor Network

Elham Bahmani, Sheida Dashtevan, Abdusalam Shaltooki, Mojtaba Jamshidi

Abstract


Considering the application of wireless sensor networks (WSNs) in critical areas like war fields, establishing security in these networks is of great challenge. One of the important and dangerous attacks in these networks is the Sybil attack. In this attack, a malicious node broadcasts several IDs simultaneously. Thus, the malicious node of the adversary attracts high traffic to itself and disrupts routing protocols and affects other operations of the network like data aggregation, voting, and resource allocation, negatively. In this paper, an efficient algorithm based on one-hop and two-hop neighborhood information is proposed to detect Sybil nodes in the stationary WSNs. The proposed algorithm is executed locally with the collaboration of neighboring nodes. The main purpose of the proposed algorithm is to increase the accuracy of detecting Sybil nodes under various conditions including the condition in which a malicious node broadcasts a few numbers of Sybil IDs which is the shortcoming of most existing algorithms. The proposed algorithm is simulated in MATLAB and its efficiency is compared with two similar algorithms in terms of true and false detection rates. The proposed algorithm not only reduces communication overhead but also increases the accuracy of detecting Sybil nodes compared to two similar algorithms.

Keywords


Wireless Sensor Network; Security; Sybil attack;

References


J. Yick, B. Mukherjee and D. Ghosal. 2008. Wireless sensor network survey. Computer Networks. 52(12): 2292–2330.

M. Jamshidi, A. A. Shaltooki, Z. D. Zadeh and A. M. Darwesh, “A Dynamic ID Assignment Mechanism to Defend Against Node Replication Attack in Static Wireless Sensor Networks”, JOIV: International Journal on Informatics Visualization, Vol. 3, No. 1, 2019.

M Jamshidi, H Bazargan, AA Shaltooki, AM Darwesh, A Hybrid Key Pre-Distribution Scheme for Securing Communications in Wireless Sensor Networks. JOIV: International Journal on Informatics Visualization 3(1) (2019) 41-46.

Jamshidi, M., Poor, S.S.A., Qader, N.N., Esnaashari, M. and Meybodi, M.R., 2019. A Lightweight Algorithm against Replica Node Attack in Mobile Wireless Sensor Networks using Learning Agents. IEIE Transactions on Smart Processing & Computing, 8(1), pp.58-70.

J. R. Douceur, “The Sybil attack”, First International Workshop on Peer-to-Peer Systems (IPTPS ‘02), 2002.

J. Newsome, E. Shi, D. Song and A. Perrig. 2004. The Sybil attack in sensor networks: analysis and defenses. Proc. International Symposium on Information Processing in Sensor Networks: 259–268

M. Demirbas and Y. Song, “An RSSI-based scheme for Sybil attack detection in wireless sensor networks” IEEE Computer Society International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 570–574, 2006.

S. Misra and S. Myneni, “On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI”, IEEE Global Telecommunications Conference (GLOBECOM), pp. 1-4, 2010.

M. Jamshidi, E. Zangeneh, M. Esnaashari, A. M. Darwesh and M. R. Meybodi. 2019. A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It. Wireless Personal Communications, 105 (1) 145-173.

Jamshidi, M., Ranjbari, M., Esnaashari, M., Darwesh, A.M. and Meybodi, M.R., 2019. A New Algorithm to Defend Against Sybil Attack in Static Wireless Sensor Networks Using Mobile Observer Sensor Nodes. Adhoc & Sensor Wireless Networks, 43, pp. 213–238.

K. F. Ssu, W. T. Wang, and W. C. Chang, “Detecting Sybil attacks in wireless Sensor Networks using neighboring information”, Computer Networks, Vol. 53, No. 18, pp. 3042–3056, 2009.

R. Rafeh, and M. Khodadadi, “Detecting Sybil Nodes in Wireless Sensor Networks Using Two-hop Messages”, Indian Journal of Science and Technology, Vol. 7, No. 9, pp. 1359-1368, 2014.

S. Rupinder, J. Singh, and R Singh, “TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 16, No. 11, 2016.

U. S. Dhamodharan and R. Vayanaperumal, “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method”, The Scientific World Journal, Vol. 1, No. 1, pp. 13-17, 2015.

Sarigiannidis, P., Karapistoli, E. and Economides, A.A., 2015. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. expert systems with applications, 42(21), pp.7560-7572

M. Jamshidi, E. Zangeneh, M. Esnaashari, and M. R. Meybodi, “A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks”, Computers & Electrical Engineering, 64, 2017, pp. 220-232.

M. Jamshidi, M. Ranjbari, M. Esnaashari, N. N. Qader and M. R. Meybodi. 2018. Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes. JOIV: International Journal on Informatics Visualization, 2(3): 159-165.

A. Andalib, M. Jamshidi, F. Andalib and D. Momeni. 2016. A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor Networks using Sink Nodes. International Journal of Computer Applications Technology and Research. 5(7): 433 – 438.

Jamshidi, M., Darwesh, A.M., Lorenc, A., Ranjbari, M. and Meybodi, M.R., 2018. A Precise Algorithm for Detecting Malicious Sybil Nodes in Mobile Wireless Sensor Networks. IEIE Transactions on Smart Processing & Computing, 7(6), pp.457-466.




DOI: http://dx.doi.org/10.30630/joiv.3.2.235

Refbacks



Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : hidraamnur@live.com | hidra@pnp.ac.id


Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats