A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks

Wireless sensor networks are being used more and more. Sensor nodes can be distributed in hazardous environments to collect data. As these environments are usually unsecured, provide security in wireless sensor networks is vital. Detecting attacks in sensor networks is inevitable to provide security. Various attacks threaten sensor networks one of which is Sybil attack, which can be a big threat for geographical routing protocols and multi-path routing. In this paper, a distributed method has been presented using mobile agents and local information of each sensor to detect Sybil attack. The results of simulation show the efficacy of this method in comparison with previous methods.

[1]  Joseph M. Hellerstein,et al.  Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[2]  Mi Wen,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[3]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[4]  Lisa Ann Osadciw,et al.  Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence , 2008, SPIE Defense + Commercial Sensing.

[5]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[6]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[7]  Victor C. M. Leung,et al.  Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..

[8]  李辉,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[11]  Nor Badrul Anuar Bin Juma'at Routing Protocol Design for Secure WSN: Review and Open Research Issues , 2014 .

[12]  Reza Rafeh,et al.  A novel agent-based approach to detect sinkhole attacks in wireless sensor networks , 2013, Comput. Secur..

[13]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[14]  Stefano Chessa,et al.  GPS free coordinate assignment and routing in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[15]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[16]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[17]  Hairong Qi,et al.  Mobile-agent-based collaborative signal and information processing in sensor networks , 2003, Proc. IEEE.

[18]  Nor Badrul Anuar,et al.  Routing protocol design for secure WSN: Review and open research issues , 2014, J. Netw. Comput. Appl..

[19]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[20]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[21]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[22]  Victor C. M. Leung,et al.  Applications and design issues for mobile agents in wireless sensor networks , 2007, IEEE Wireless Communications.

[23]  Jing Xu,et al.  A new mobile agent architecture for wireless sensor networks , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[24]  Xue Wang,et al.  Optimized Deployment Strategy of Mobile Agents in Wireless Sensor Networks , 2006, Sixth International Conference on Intelligent Systems Design and Applications.

[25]  Wang Chang Security in Wireless Network , 2006 .