Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes

Mojtaba Jamshidi - Islamic Azad University, Qazvin, Iran
Milad Ranjbari - Islamic Azad University, Arak, Iran
Mehdi Esnaashari - K. N. Toosi University of Technology, Tehran, Iran
Nooruldeen Nasih Qader - University of Human Development, Iraq
Mohammad Reza Meybodi - Amirkabir University of Technology, Tehran, Iran

Citation Format:



Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which a malicious node attempts to propagate several fabricated identities. This attack significantly affects routing protocols and many network operations, including voting and data aggregation. The mobility of nodes in mobile wireless sensor networks makes it problematic to employ proposed Sybil node detection algorithms in static wireless sensor networks, including node positioning, RSSI-based, and neighbour cooperative algorithms. This paper proposes a dynamic, light-weight, and efficient algorithm to detect Sybil nodes in mobile wireless sensor networks. In the proposed algorithm, observer nodes exploit neighbouring information during different time periods to detect Sybil nodes. The proposed algorithm is implemented by J-SIM simulator and its performance is compared with other existing algorithm by conducting a set of experiments. Simulation results indicate that the proposed algorithm outperforms other existing methods regarding detection rate and false detection rate. Moreover, they also showed that the mean detection rate and false detection rate of the proposed algorithm are respectively 99% and less than 2%.


Wireless sensor networks; Sybil attack; mobile node; observer node.

Full Text:



A. Rathee, R. Singh, and A. Nandini. "Wireless Sensor Network-Challenges and Possibilities." International Journal of Computer Applications, vol. 140, no. 2, 2016.

A. R., Dhakne and P. N. Chatur. "Detailed Survey on Attacks in Wireless Sensor Network." In Proceedings of the International Conference on Data Engineering and Communication Technology, pp. 319-331. Springer Singapore, 2017.

J. R. Douceur, “The Sybil attackâ€, First International Workshop on Peer-to-Peer Systems (IPTPS ‘02), 2002.

C Karlof. And D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasuresâ€, AdHoc Networks, Vol. 1, No. 2, pp. 299-302, 2003.

A. Ajina, M. K. Nair, “Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communicationâ€, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 9, No. 1, 2017.

J. Newsome, E. Shi, D Song. and A. Perrig, “The Sybil attack in sensor networks: analysis and defencesâ€, International Symposium on Information Processing in Sensor Networks, pp. 259–268, 2004.

S. Zhong, L. Li, Y. G. Liu and Y. R. Yang, “Privacy-preserving location based services for mobile users in Wireless Networksâ€, Technical Report YALEU/DCS/TR-1297, Yale Computer Science, 2004.

M. Demirbas and Y. Song, “An RSSI-based scheme for Sybil attack detection in wireless sensor networks†IEEE Computer Society International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 570–574, 2006.

S. Misra and S. Myneni, “On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSIâ€, IEEE Global Telecommunications Conference (GLOBECOM), pp. 1-4, 2010.

S. Chen, G. Yang, and S. Chen, “A Security Routing Mechanism against Sybil Attack for Wireless Sensor Networksâ€, International Conference on Communications and Mobile Computing, 2010.

A. Jangra, P. Swati, “Securing LEACH Protocol from Sybil Attack using Jakes Channel Scheme (JCS)â€, International Conference on Advances in ICT for Emerging Regions, pp. 79-87, 2011.

WANG X.-D., SUN Y.-Q. and MENG X.-X.: Cluster-based Defending Mechanism for Sybil Attacks in Wireless Sensor Network. Computer Engineering, Vol. 15, 2009.

W. Shi, S. Liu, and Z. Zhang, “A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Networkâ€, KSII Transactions on Internet & Information Systems, Vol. 9, No. 9, pp. 3738-3749, 2015.

M. Jamshidi, A. Hannani, M. Esnaashari, and M. R. Meybodi, “Defending Sybil Attack in Wireless Sensor Networks with the aid of Detecting Suspicious Arias in the Networkâ€, 20th Computer Soceity of Iran Annual Conference, University of Mashhad, Mashhad, Iran, 2-4, 2015.

K. F. Ssu, W. T. Wang, and W. C. Chang, “Detecting Sybil attacks in wireless Sensor Networks using neighboring informationâ€, Computer Networks, Vol. 53, No. 18, pp. 3042–3056, 2009.

R. Rafeh, and M. Khodadadi, “Detecting Sybil Nodes in Wireless Sensor Networks Using Two-hop Messagesâ€, Indian Journal of Science and Technology, Vol. 7, No. 9, pp. 1359-1368, 2014.

S. Ramachandran and V. Shanmugan, “Impact of Sybil and Wormhole Attacks in Location based Geographic Multicast Routing Protocol for Wireless Sensor Networksâ€, Journal of Computer Science, Vol. 7, No. 7, pp. 973-979, 2011.

R. Muraleedharan, X. Ye, and L.A. Osadciw, “Prediction of Sybil Attack on WSN Using Bayesian Network and Swarm Intelligenceâ€, Wireless Sensing and Processing, Orlando, FL, USA, 2008.

S. Sharmila and G. Umamaheswari, "Detection of Sybil attack in mobile wireless sensor networks", International journal of engineering science & advanced technology, Vol. 2, pp. 256 – 262, 2012.

S. Sharmilaa and G. Umamaheswari, “Node ID based detection of Sybil attack in mobile wireless sensor networkâ€, International Journal of Electronics, Vol. 100, No. 10, pp. 1441-1454, 2012.

M. Jamshidi, E. Zangeneh, M. Esnaashari, and M. R. Meybodi, “A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networksâ€, Computers & Electrical Engineering, 64, pp. 220-232.

S. Rupinder, J. Singh, and R Singh, “TBSD: A Defend Against Sybil Attack in Wireless Sensor Networksâ€, International Journal of Computer Science and Network Security (IJCSNS), Vol. 16, No. 11, 2016.

U. S. Dhamodharan and R. Vayanaperumal, “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Methodâ€, The Scientific World Journal, Vol. 1, No. 1, pp. 13-17, 2015.

R. Amuthavalli and R. S. Bhuvaneswaran, “DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHODâ€, Journal of Theoretical & Applied Information Technology, Vol. 67, No. 1, pp.236-246, 2014.

S. Sinha, A. Paul, and S. Pal, “Use of Spline Curve in Sybil Attack Detection based on Received Signal Power-New Approachâ€, International Journal on Recent Trends in Engineering & Technology, Vol. 11, No. 1, pp. 602-611, 2014.

S. Panagiotis, E. Karapistoli, and A. Economides, “Detecting Sybil attacks in wireless sensor networks using UWB ranging-based informationâ€, Expert Systems with Applications, Vol. 42, No. 21, pp. 7560-7572, 2015.

R.-H. Hu, X.-M. Dong, and D.-L. Wang, “Defense mechanism against node replication attacks and Sybil attacks in wireless sensor networksâ€, Acta Electronica Sinica, Vol. 43, No. 4, pp. 744-752, 2015.

J-SIM Simulator,, December 25, 2017.

C. M. Yu, C. S. Lu, and S. Y. Kuo, “Mobile Sensor Network Resilient Against Node Replication Attacksâ€, IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2008.