Sybil attack Detection: Improving security of WSNs for smart power grid application

For a large number of sensor network applications security is crucial, especially if the sensor network protects or monitors critical infrastructures such as electric power infrastructure. Smart grid revolutionizes the current electric power infrastructure by the use of wireless sensor networks. Sybil attack is one of the most disrupting attacks in the context of wireless sensor networks. In this attack a malicious node forges multiple identities and therefore disrupts many network protocols such as routing, voting, data aggregation and misbehavior detection. This attack can make several forms of attacks possible. It is also problematic for protocols that rely on voting schemes. Therefore a security mechanism against this attack for wireless sensor networks is mandatory. In this paper we introduced a novel approach called SDTM (Sybil attack Detection using Traffic Monitoring) in a neighbor-based detection manner to detect such attacks. This approach is based on the traffic density around nodes and uses statistical methods to detect the malicious nodes. For simulating our network we used OMNeT++ simulator. After 80 simulations the proposed mechanism (SDTM) achieved a 95.13% detection rate and a 2.29% misdetection rate. we have shown that the occurrence of a Sybil attack using this method is detectable.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[3]  Vashek Matyas,et al.  Neighbor-Based Intrusion Detection for Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.

[4]  李辉,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[5]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[6]  Mi Wen,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[7]  Wen-Chung Chang,et al.  Defending Sybil attacks based on neighboring relations in wireless sensor networks , 2010, Secur. Commun. Networks.

[8]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Nikita Borisov,et al.  Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[10]  Yide Liu,et al.  Wireless Sensor Network Applications in Smart Grid: Recent Trends and Challenges , 2012, Int. J. Distributed Sens. Networks.

[11]  Peng Ning,et al.  Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[15]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[16]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[17]  Chuang Lin,et al.  Security mechanisms Analysis of Wireless Sensor Networks specific Routing attacks , 2006, 2006 First International Symposium on Pervasive Computing and Applications.

[18]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[19]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .