Energy trust system for detecting sybil attack in clustered wireless sensor networks

Wireless Sensor Network (WSN) is an emerging technology that offers great promise for various applications. The sensing capabilities combined with relatively small processing power and wireless communication makes it one of the main technologies to be exploited in the future. Despite its attractive features, WSN is vulnerable to various security attacks. The constraints of WSN such as limited energy and memory make the security problem even more critical. One of the security issues of WSN is it is susceptible to sybil attack. In this attack, the adversary forges multiple entities to disrupt the entire network. This paper addresses the problem by developing a lightweight trust system using energy as a metric parameter for a hierarchical WSN. The performance evaluation of this system shows efficiency and scalability for detecting sybil attacks in terms of true and false positive detection in a heterogeneous WSN. Furthermore, this system reduces the communication overhead in the network by cancelling feedback and recommendations among sensor nodes (SNs).

[1]  Chunling Cheng,et al.  An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[2]  K Abirami.,et al.  Sybil attack in Wireless Sensor Network , 2013 .

[3]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[4]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[5]  B. R. Badrinath,et al.  The distinctive design characteristic of a wireless sensor network: the energy map , 2004, Computer Communications.

[6]  Karen Hsu karenhsu Security Analysis on Defenses against Sybil Attacks in Wireless Sensor Networks , 2007 .

[7]  S. Karthik,et al.  Trust management techniques in Wireless Sensor Networks: An evaluation , 2011, 2011 International Conference on Communications and Signal Processing.

[8]  Zhou Su,et al.  Weighted trust evaluation-based malicious node detection for wireless sensor networks , 2009, Int. J. Inf. Comput. Secur..

[9]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[10]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[11]  Catherine Rosenberg,et al.  Homogeneous vs heterogeneous clustered sensor networks: a comparative study , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[12]  Siwei Peng An Id-based Multiple Authentication scheme against attacks in wireless sensor networks , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[13]  李辉,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[14]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[15]  Geng Yang,et al.  Sybil Attack Detection Based on RSSI for Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[16]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[17]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[18]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.