Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes
DOI: http://dx.doi.org/10.30630/joiv.2.3.131
Abstract
Keywords
Full Text:
PDFReferences
A. Rathee, R. Singh, and A. Nandini. "Wireless Sensor Network-Challenges and Possibilities." International Journal of Computer Applications, vol. 140, no. 2, 2016.
A. R., Dhakne and P. N. Chatur. "Detailed Survey on Attacks in Wireless Sensor Network." In Proceedings of the International Conference on Data Engineering and Communication Technology, pp. 319-331. Springer Singapore, 2017.
J. R. Douceur, “The Sybil attackâ€, First International Workshop on Peer-to-Peer Systems (IPTPS ‘02), 2002.
C Karlof. And D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasuresâ€, AdHoc Networks, Vol. 1, No. 2, pp. 299-302, 2003.
A. Ajina, M. K. Nair, “Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communicationâ€, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 9, No. 1, 2017.
J. Newsome, E. Shi, D Song. and A. Perrig, “The Sybil attack in sensor networks: analysis and defencesâ€, International Symposium on Information Processing in Sensor Networks, pp. 259–268, 2004.
S. Zhong, L. Li, Y. G. Liu and Y. R. Yang, “Privacy-preserving location based services for mobile users in Wireless Networksâ€, Technical Report YALEU/DCS/TR-1297, Yale Computer Science, 2004.
M. Demirbas and Y. Song, “An RSSI-based scheme for Sybil attack detection in wireless sensor networks†IEEE Computer Society International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 570–574, 2006.
S. Misra and S. Myneni, “On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSIâ€, IEEE Global Telecommunications Conference (GLOBECOM), pp. 1-4, 2010.
S. Chen, G. Yang, and S. Chen, “A Security Routing Mechanism against Sybil Attack for Wireless Sensor Networksâ€, International Conference on Communications and Mobile Computing, 2010.
A. Jangra, P. Swati, “Securing LEACH Protocol from Sybil Attack using Jakes Channel Scheme (JCS)â€, International Conference on Advances in ICT for Emerging Regions, pp. 79-87, 2011.
WANG X.-D., SUN Y.-Q. and MENG X.-X.: Cluster-based Defending Mechanism for Sybil Attacks in Wireless Sensor Network. Computer Engineering, Vol. 15, 2009.
W. Shi, S. Liu, and Z. Zhang, “A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Networkâ€, KSII Transactions on Internet & Information Systems, Vol. 9, No. 9, pp. 3738-3749, 2015.
M. Jamshidi, A. Hannani, M. Esnaashari, and M. R. Meybodi, “Defending Sybil Attack in Wireless Sensor Networks with the aid of Detecting Suspicious Arias in the Networkâ€, 20th Computer Soceity of Iran Annual Conference, University of Mashhad, Mashhad, Iran, 2-4, 2015.
K. F. Ssu, W. T. Wang, and W. C. Chang, “Detecting Sybil attacks in wireless Sensor Networks using neighboring informationâ€, Computer Networks, Vol. 53, No. 18, pp. 3042–3056, 2009.
R. Rafeh, and M. Khodadadi, “Detecting Sybil Nodes in Wireless Sensor Networks Using Two-hop Messagesâ€, Indian Journal of Science and Technology, Vol. 7, No. 9, pp. 1359-1368, 2014.
S. Ramachandran and V. Shanmugan, “Impact of Sybil and Wormhole Attacks in Location based Geographic Multicast Routing Protocol for Wireless Sensor Networksâ€, Journal of Computer Science, Vol. 7, No. 7, pp. 973-979, 2011.
R. Muraleedharan, X. Ye, and L.A. Osadciw, “Prediction of Sybil Attack on WSN Using Bayesian Network and Swarm Intelligenceâ€, Wireless Sensing and Processing, Orlando, FL, USA, 2008.
S. Sharmila and G. Umamaheswari, "Detection of Sybil attack in mobile wireless sensor networks", International journal of engineering science & advanced technology, Vol. 2, pp. 256 – 262, 2012.
S. Sharmilaa and G. Umamaheswari, “Node ID based detection of Sybil attack in mobile wireless sensor networkâ€, International Journal of Electronics, Vol. 100, No. 10, pp. 1441-1454, 2012.
M. Jamshidi, E. Zangeneh, M. Esnaashari, and M. R. Meybodi, “A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networksâ€, Computers & Electrical Engineering, 64, pp. 220-232.
S. Rupinder, J. Singh, and R Singh, “TBSD: A Defend Against Sybil Attack in Wireless Sensor Networksâ€, International Journal of Computer Science and Network Security (IJCSNS), Vol. 16, No. 11, 2016.
U. S. Dhamodharan and R. Vayanaperumal, “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Methodâ€, The Scientific World Journal, Vol. 1, No. 1, pp. 13-17, 2015.
R. Amuthavalli and R. S. Bhuvaneswaran, “DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHODâ€, Journal of Theoretical & Applied Information Technology, Vol. 67, No. 1, pp.236-246, 2014.
S. Sinha, A. Paul, and S. Pal, “Use of Spline Curve in Sybil Attack Detection based on Received Signal Power-New Approachâ€, International Journal on Recent Trends in Engineering & Technology, Vol. 11, No. 1, pp. 602-611, 2014.
S. Panagiotis, E. Karapistoli, and A. Economides, “Detecting Sybil attacks in wireless sensor networks using UWB ranging-based informationâ€, Expert Systems with Applications, Vol. 42, No. 21, pp. 7560-7572, 2015.
R.-H. Hu, X.-M. Dong, and D.-L. Wang, “Defense mechanism against node replication attacks and Sybil attacks in wireless sensor networksâ€, Acta Electronica Sinica, Vol. 43, No. 4, pp. 744-752, 2015.
J-SIM Simulator, https://sites.google.com/site/jsimofficial/, December 25, 2017.
C. M. Yu, C. S. Lu, and S. Y. Kuo, “Mobile Sensor Network Resilient Against Node Replication Attacksâ€, IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008.