Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes

Sybil attack is one of the well-known dangerous attacks against wireless sensor networks in which a malicious node attempts to propagate several fabricated identities. This attack significantly affects routing protocols and many network operations, including voting and data aggregation. The mobility of nodes in mobile wireless sensor networks makes it problematic to employ proposed Sybil node detection algorithms in static wireless sensor networks, including node positioning, RSSI-based, and neighbour cooperative algorithms. This paper proposes a dynamic, light-weight, and efficient algorithm to detect Sybil nodes in mobile wireless sensor networks. In the proposed algorithm, observer nodes exploit neighbouring information during different time periods to detect Sybil nodes. The proposed algorithm is implemented by J-SIM simulator and its performance is compared with other existing algorithm by conducting a set of experiments. Simulation results indicate that the proposed algorithm outperforms other existing methods regarding detection rate and false detection rate. Moreover, they also showed that the mean detection rate and false detection rate of the proposed algorithm are respectively 99% and less than 2%.

[1]  Wei Shi,et al.  A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network , 2015, KSII Trans. Internet Inf. Syst..

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Shyamala Ramachandran,et al.  Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks , 2011 .

[4]  P. N. Chatur,et al.  Detailed Survey on Attacks in Wireless Sensor Network , 2017 .

[5]  Sheng Zhong,et al.  Privacy-Preserving Location-based Services for Mobile Users in Wireless Networks , 2004 .

[6]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[7]  Reza Rafeh,et al.  Detecting Sybil Nodes in Wireless Sensor Networks Using Two-hop Messages , 2014 .

[8]  Hu Rong-hu Defense Mechanism Against Node Replication Attacks and Sybil Attacks in Wireless Sensor Networks , 2015 .

[9]  Randeep Singh,et al.  Wireless Sensor Network- Challenges and Possibilities , 2016 .

[10]  Satyajayant Misra,et al.  On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[11]  S. Sharmila,et al.  Node ID based detection of Sybil attack in mobile wireless sensor network , 2013 .

[12]  R. S. Bhuvaneswaran,et al.  DETECTION AND PREVENTION OF SYBIL ATTACK IN WIRELESS SENSOR NETWORK EMPLOYING RANDOM PASSWORD COMPARISON METHOD , 2014 .

[13]  Chun-Shien Lu,et al.  Mobile Sensor Network Resilient Against Node Replication Attacks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[14]  Jatinder Singh,et al.  TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks , 2016 .

[15]  Geng Yang,et al.  A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks , 2010, 2010 International Conference on Communications and Mobile Computing.

[16]  Anastasios A. Economides,et al.  Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..

[17]  Mohammad Reza Meybodi,et al.  A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks , 2017, Comput. Electr. Eng..

[18]  Rajamani Vayanaperumal,et al.  Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method , 2015, TheScientificWorldJournal.

[19]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[20]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[21]  A. Ajina,et al.  Cross Layered Network Condition Aware Mobile-Wireless Multimedia Sensor Network Routing Protocol for Mission Critical Communication , 2017, Int. J. Commun. Networks Inf. Secur..

[22]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.