Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)

Wireless sensor networks (WSNs) are an emerging technology used in many applications in both the civilian and military domains. Typically, these networks are deployed in remote and hostile environments. They are vulnerable to various kinds of security attacks, of which sybil attacks are some of the most harmful. Thus, it is necessary to solve the problems related to sensor node constraints and the need for high WSN security. This paper proposes an energy trust system (ETS) for WSNs to effectively detect sybil attacks. It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. Data aggregation is also utilized to reduce communication overhead and save energy. We analyze the performance of the proposed system in terms of security and resource consumption using theoretical and simulation-based approaches. The simulation results show that the proposed ETS is effective and robust in detecting sybil attacks in terms of the true and false positive rates. By virtue of the application of multi-level detection, the proposed system achieves more than 70% detection at the first level, which significantly increases to 100% detection at the second level. Furthermore, this system reduces communication overhead, memory overhead, and energy consumption by eliminating the exchange of feedback and recommendation messages among sensor nodes.

[1]  A. Varga,et al.  THE OMNET++ DISCRETE EVENT SIMULATION SYSTEM , 2003 .

[2]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[3]  Guangjie Han,et al.  A Novel Method for Node Fault Detection Based on Clustering in Industrial Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[4]  Yang Xiao,et al.  Security co-existence of wireless sensor networks and RFID for pervasive computing , 2008, Comput. Commun..

[5]  K Abirami.,et al.  Sybil attack in Wireless Sensor Network , 2013 .

[6]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[7]  Xiao Wang,et al.  Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[8]  Sudip Misra,et al.  Reputation-based role assignment for role-based access control in wireless sensor networks , 2011, Comput. Commun..

[9]  Sung Won Kim,et al.  A Secure Trust Establishment Scheme for Wireless Sensor Networks , 2014, Sensors.

[10]  Zhou Su,et al.  Weighted trust evaluation-based malicious node detection for wireless sensor networks , 2009, Int. J. Inf. Comput. Secur..

[11]  Subir Kumar Sarkar,et al.  A Light Weight Trust based Secure and Energy Efficient Clustering in Wireless Sensor Network: Honey Bee Mating Intelligence Approach☆ , 2013 .

[12]  Karen Hsu karenhsu Security Analysis on Defenses against Sybil Attacks in Wireless Sensor Networks , 2007 .

[13]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[14]  Sung Won Kim,et al.  A Robust Trust Establishment Scheme for Wireless Sensor Networks , 2014, Sensors.

[15]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[16]  Catherine Rosenberg,et al.  Homogeneous vs heterogeneous clustered sensor networks: a comparative study , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[17]  Huafeng Wu,et al.  Agent-based Trust Model in Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[18]  Raouf Boutaba,et al.  Reliable and energy efficient cooperative detection in wireless sensor networks , 2013, Comput. Commun..

[19]  Shifeng Sun,et al.  SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs , 2015, Comput. Commun..

[20]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[21]  Huafeng Wu,et al.  Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .

[22]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[23]  Yang Xiang,et al.  A novel multiple-level trust management framework for wireless sensor networks , 2014, Comput. Networks.

[24]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[25]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[26]  R. B. Patel,et al.  EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks , 2009, Comput. Commun..

[27]  Guangjie Han,et al.  IDSEP: a novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks , 2013, IET Inf. Secur..

[28]  Yiwei Thomas Hou,et al.  SybilShield: An agent-aided social network-based Sybil defense among multiple communities , 2013, 2013 Proceedings IEEE INFOCOM.

[29]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[30]  Madjid Merabti,et al.  Security in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[31]  Tanveer A. Zia,et al.  Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks , 2010, 2010 International Conference on Availability, Reliability and Security.

[32]  Hong Zhao,et al.  Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[33]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[34]  Nidal Nasser,et al.  Secure Multipath Routing Protocol for Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).

[35]  Lisa Ann Osadciw,et al.  Prediction of Sybil attack on WSN using Bayesian network and swarm intelligence , 2008, SPIE Defense + Commercial Sensing.

[36]  Jan M. Rabaey,et al.  Energy aware routing for low energy ad hoc sensor networks , 2002, 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No.02TH8609).

[37]  S. Karthik,et al.  Trust management techniques in Wireless Sensor Networks: An evaluation , 2011, 2011 International Conference on Communications and Signal Processing.