Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN

Wireless sensor networks (WSN) are generally employed in unattended hostile areas such as forest monitoring, agriculture fields, military battlefields. An adversary can physically capture WSN deployed in a hostile environment. Once an adversary captures a node, the cryptographic information and the software program can be easily extracted. Also, the adversary can reprogram the software inside the node. After reprogramming, the adversary can replicate and deploy the node with multiple identities to do malicious activities. This kind of identity theft attack can be classified as Clone attack or Sybil attack. These identity theft attacks are addressed by many distributed, centralised and localised solutions. Most of these solutions utilise private/public key, and symmetric key algorithms are energy and memory demanding, while the WSN are energy and memory constrained. This paper proposes a novel Sybil attack detection protocol (NoSad) to identify and isolate the Sybil attack in WSN. This protocol is a localised method using intra-cluster communication and RSSI value to identify the Sybil node. The proposed protocol is simulated extensively with various topologies, and obtained results prove that the protocol is highly efficient in detection ratio, energy utilisation, memory usage, computation and communication requirement. This protocol may be used in any resource-constrained WSN to obtain a satisfactory result. This work provides a solution for different scenarios of Sybil node position to counter the Sybil attack in WSN.

[1]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[2]  Peng Ning,et al.  Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[3]  Amr Tolba,et al.  Trust-based neighbor selection using activation function for secure routing in wireless sensor networks , 2018, Journal of Ambient Intelligence and Humanized Computing.

[4]  R. Karthipan,et al.  Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms , 2017, Cluster Computing.

[5]  Karim Faez,et al.  A New Lightweight Watchdog-Based Algorithm for Detecting Sybil Nodes in Mobile WSNs , 2018, Future Internet.

[6]  Mohammad Reza Meybodi,et al.  A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks , 2017, Comput. Electr. Eng..

[7]  Shyamala Ramachandran,et al.  Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks , 2011 .

[8]  Majid Haghparast,et al.  A Novel Fault-Tolerant LEACH Clustering Protocol for Wireless Sensor Networks , 2014, J. Circuits Syst. Comput..

[9]  Geng Yang,et al.  Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[10]  Satyajayant Misra,et al.  On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[11]  Mohammad Reza Meybodi,et al.  Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes , 2018 .

[12]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[13]  Iraj Sadegh Amiri,et al.  Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks , 2020, Journal of Ambient Intelligence and Humanized Computing.

[14]  Reza Rafeh,et al.  Detecting Sybil Nodes in Wireless Sensor Networks Using Two-hop Messages , 2014 .

[15]  Mi Wen,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[16]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[17]  Rolf Kraemer,et al.  A Review on Self-Healing and Self-Organizing Techniques for Wireless Sensor Networks , 2019, J. Circuits Syst. Comput..

[18]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[19]  Anastasios A. Economides,et al.  Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..

[20]  Mo Wei,et al.  AOA based trust evaluation scheme for Sybil attack detection in WSN , 2010 .

[21]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[22]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[23]  Roberto Di Pietro,et al.  Distributed Detection of Clone Attacks in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.