TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks
نویسندگان
چکیده
Security has become a most important issue for several significant applications provided by wireless sensor networks (WSNs). The intrinsically susceptible features of WSNs employ them susceptible to a diversity of attacks. This paper has centered on how to protect from a principally destructive type of attack called Sybil attack. A Sybil node using only one physical device may produce an random number of extra node identities and can be used to interrupt standard performance of the WSNs, like multi-hop routing which is utilised to discover numerous disjoint paths among source and destination. Recently, there has been a increasing attention in leveraging WSNs to mitigate Sybil attacks. Digital certificates are a way used to show individuality, however, it is not feasible in sensor networks. This paper has proposed a Trust Based Sybil Detection (TBSD) technique to detect Sybil nodes in WSNs. The TBSD scheme is based on manipulative trust values of adjacent sensor nodes and the nodes with the trust values less than a threshold value are detected as Sybil node. The feasibility of TBSD method is demonstrated systematically, while experimental results of TBSD in exposing Sybil attacks is expansively assessed equally mathematically and numerically. The acquire consequence show that the TBSD attains significant attack detection rate than existing techniques.
منابع مشابه
Random Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملThe sybil attack in sensor networks: analysis & defenses
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important f...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملDefending Against Sybil Attacks in Sensor Networks using Pre-Distributed key
A wireless sensor network is a collaborative network in which nodes perform their sensing task in one hand, and function as relay for transferring the data of other nodes on the other hand if necessary. It consists of many inexpensive wireless nodes, each having sensing capability with some computational and communication power. As sensor networks are coming to be of wide-spread deployment, sec...
متن کامل