Have a personal or library account? Click to login

Detecting Sybil Attacks In Wireless Sensor Networks Using Sequential Analysis

Open Access
|Jun 2016

References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer networks, vol. 38, no. 4, pp. 393-422, 2002.10.1016/S1389-1286(01)00302-4
  2. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad hoc networks, vol. 1, no. 2, pp. 293-315, 2003.10.1016/S1570-8705(03)00008-8
  3. Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, “Defending against sybil attacks in sensor networks,” in Distributed Computing Systems Workshops, 2005. 25th IEEE International Conference on, pp. 185-191, IEEE, 2005.
  4. E. Fadel, V. Gungor, L. Nassef, N. Akkari, M. A. Maik, S. Almasri, and I. F. Akyildiz, “A survey on wireless sensor networks for smart grid,” Computer Communications, vol. 71, pp 22-33, November 2015.10.1016/j.comcom.2015.09.006
  5. Bhattacharjee, D., and R. Bera. “Development of smart detachable wireless sensing system for environmental monitoring.” International Journal on Smart Sensing and Intelligent Systems, vol. 7, no. 3, 2014,pp 1239-1253.10.21307/ijssis-2017-703
  6. Q. Yang, X. Zhu, H. Fu, and X. Che, “Survey of security technologies on wireless sensor networks,” Journal of Sensors, Volume 2015, pp 1-9.10.1155/2015/842392
  7. A. Wheeler, “Commercial applications of wireless sensor networks using zigbee,” IEEE Communications Magazine, vol. 45, no. 4, pp. 70-77, 2007.10.1109/MCOM.2007.343615
  8. El Alami, Hassan, and Abdellah NAJID. “SEFP: A New Routing Approach Using Fuzzy Logic for Clustered Heterogeneous Wireless Sensor Networks”, International Journal on Smart Sensing & Intelligent Systems, vol. 8, no. 4, 2015,pp 2286-2306.10.21307/ijssis-2017-854
  9. J. Wang, G. Yang, Y. Sun, and S. Chen, “Sybil attack detection based on rssi for wireless sensor network,” in International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2684-2687, IEEE, 2007.
  10. N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims,” in Proceedings of the 2nd ACM workshop on Wireless security, pp. 1-10, ACM, 2003.10.1145/941311.941313
  11. U. S. R. K. Dhamodharan and R. Vayanaperumal, “Detecting and preventing sybil attacks in wire-less sensor networks using message authentication and passing method,” The Scientific World Journal, vol. 2015, 2015.10.1155/2015/841267450680626236773
  12. R. AMUTHAVALLI and R. BHUVANESWARAN, “Detection and prevention of sybil attack in wireless sensor network employing random password comparison method.,” Journal of Theoretical & Applied Information Technology, vol. 67, no. 1, 2014.
  13. W. Wang, D. Pu, and A. Wyglinski, “Detecting sybil nodes in wireless networks with physical layer network coding,” in 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 21-30, IEEE, 2010.
  14. W. Chang and J. Wu, “A survey of sybil attacks in networks,” Temple University, Computer and Information Sciences. Philadelphia: Temple University.
  15. S. Hussain and M. S. Rahman, “Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks,” in SPIE Defense, Security, and Sensing, pp. 73440G-73440G, International Society for Optics and Photonics, 2009.
  16. S. Marian and P. Mircea, “Sybil attack type detection in wireless sensor networks based on received signal strength indicator detection scheme,” in Applied Computational Intelligence and Informatics (SACI), 2015 IEEE 10th Jubilee International Symposium on, pp. 121-124, IEEE, 2015.10.1109/SACI.2015.7208183
  17. M. Wen, H. Li, Y.-F. Zheng, and K.-F. Chen, “Tdoa-based sybil attack detection scheme for wireless sensor networks,” Journal of Shanghai University (English Edition), vol. 12, pp. 6670, 2008.10.1007/s11741-008-0113-2
  18. Y. Zeng, J. Cao, J. Hong, S. Zhang, and L. Xie, “Secure localization and location verification in wireless sensor networks: a survey,” the Journal of Supercomputing, vol. 64, no. 3, pp. 685-701, 2013.10.1007/s11227-010-0501-4
  19. Y. Wei and Y. Guan, “Lightweight location verification algorithms for wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 5, pp. 938950, 2013.
  20. D. Mukhopadhyay and I. Saha, “Location veri cation based defense against sybil attack in sensor net-works,” in Distributed Computing and Networking, pp. 509-521, Springer, 2006.10.1007/11947950_56
  21. H. Shen and X.-G. Ye, “Research on the location attack based on multiple counterfeit identities tech-nology in sensor networks,” in 2014 International Conference on Wireless Communication and Sensor Network (WCSN), pp. 193-197, IEEE, 2014.10.1109/WCSN.2014.46
  22. G. Mao, B. Fidan, and B. D. Anderson, “Wireless sensor network localization techniques,” Computer networks, vol. 51, no. 10, pp. 2529-2553, 2007.
  23. G. V. Crosby, L. Hester, and N. Pissinou, “Location-aware, trust-based detection and isolation of com-promised nodes in wireless sensor networks.,” IJ Network Security, vol. 12, no. 2, pp. 107-117, 2011.
  24. K.-F. Ssu, W.-T. Wang, and W.-C. Chang, “Detecting sybil attacks in wireless sensor networks using neighboring information,” Computer Networks, vol. 53, no. 18, pp. 30423056, 2009.
  25. R. Rafeh and M. Khodadadi, “Detecting sybil nodes in wireless sensor networks using two-hop messages,” Indian Journal of Science and Technology, vol. 7, no. 9, pp. 1359-1368, 2014.
  26. J.-W. Ho, “Sequential hypothesis testing based approach for replica cluster detection in wireless sensor networks,” Journal of Sensor and Actuator Networks, vol. 1, no. 2, pp. 153165, 2012.
  27. M. Li, Y. Xiong, X. Wu, X. Zhou, Y. Sun, S. Chen, and X. Zhu, “A regional statistics detection scheme against sybil attacks in wsns,” in 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 285-291, IEEE, 2013.10.1109/TrustCom.2013.39
  28. G. U. S Sharmila, “Energy and hop based detection of sybil attack for mobile wireless sensor networks,” International Journal of Emerging Technology and Advanced Engineering, vol. 4, no. 4, 2014.
  29. S. Golestani Najafabadi, H. R. Naji, and A. Mahani, “Sybil attack detection: Improving security of wsns for smart power grid application,” in Smart Grid Conference (SGC), 2013, pp. 273-278, IEEE, 2013.10.1109/SGC.2013.6733831
  30. Y. Liu, D. Bild, R. Dick, Z. M. Mao, and D. Wallach, “The mason test: A defense against sybil attacks in wireless networks without trusted authorities,” Indian Journal of Science and Technology, 2014.10.1109/TMC.2015.2398425
  31. J. Newsome, E. Shi, D. Song, and A. Perrig, “The sybil attack in sensor networks: analysis & defenses,” in Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 259-268, ACM, 2004.10.1145/984622.984660
  32. J. R. Douceur, “The sybil attack,” in Peer-to-peer Systems, pp. 251-260, Springer, 2002.10.1007/3-540-45748-8_24
  33. N. Abu-Ghazaleh, K.-D. Kang, and K. Liu, “Towards resilient geographic routing in wsns,” in Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 71-78, ACM, 2005.10.1145/1089761.1089774
  34. B. Tian, Y. Yao, L. Shi, S. Shao, Z. Liu, and C. Xu, “A novel sybil attack detection scheme for wire-less sensor network,” in 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology (IC-BNMT), pp. 294-297, IEEE, 2013.10.1109/ICBNMT.2013.6823960
  35. A. Vasudeva and M. Sood, “Sybil attack on lowest id clustering algorithm in the mobile ad hoc network,” International Journal of Network Security & Its Applications (IJNSA), vol. 4, no. 5, 2012.10.5121/ijnsa.2012.4511
  36. M. A. B. Karuppiah and A. R. Prakash, “Sybilsecure: An energy efficient sybil attack detection technique in wireless sensor network,” International Journal of Information, vol. 4, no. 3, 2014.10.5121/ijist.2014.4314
  37. A. Jsoang and R. Ismail, “The beta reputation system,” in Proceedings of the 15th bled electronic commerce conference, vol. 5, pp. 2502-2511, 2002.
  38. A. Wald, Sequential analysis. Courier Corporation, 1973.
  39. I. Chang, and Y.-C, “Applications of Sequential Probability Ratio Test to computerized criterion-referenced testing”, Sequential Analysis, vol. 23, no. 1, pp. 45-61, 2004.10.1081/SQA-120030194
  40. K.Cohen, and Q.Zhao, “Quest Anomaly Detection: a case of active hypothesis testing”,IEEE Information Theory Applications workshop (ITA), pp 1-5, 2014.10.1109/ITA.2014.6804268
  41. T.L.Lai, “Sequential analysis: some classical problems and new challenges”, Statist Sinica, Vol. 11, no. 2, pp. 303-350, 2001.
  42. Juliana, M. Roseline, and S. Srinivasan. “SELADG: Secure Energy Efficient Location Aware Data Gathering Approach for Wireless Sensor Networks”, International Journal on Smart Sensing & Intelligent Systems, vol. 8, no.3, 2015, pp. 1748-176710.21307/ijssis-2017-828
  43. Network simulator ns-2.35, http://www.isi.edu/nsnam/ns. Accessed: 2015-11-10.
  44. Cc2420 data sheet. http://www.ti.com/product/cc2420. Accessed: 2015-11-10.
  45. Cc2431 data sheet. www.ti.com/cn/lit/gpn/cc2431. Accessed: 2015-11-10.
Language: English
Page range: 651 - 680
Submitted on: Dec 3, 2015
Accepted on: Mar 31, 2016
Published on: Jun 1, 2016
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2016 P. Raghu Vamsi, Krishna Kant, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.