Abstract
One of the most concerns in wireless sensor networks is security. Wireless sensor networks are vulnerable to attacks in every layer of the network. They are extremely necessitous for securing network protection. Sybil attack is one of those attacks in which a legal node is converted into a Sybil one which is a replica node with a different personality using a similar ID. This kind of identity theft attack can be classified as Sybil attack. This attack mainly influences routing protocols and operations such as voting, data aggregation and reputation evaluation. This paper proposes a dynamic and accurate method for Sybil attack detection and prevention. The proposed method generates a routing table that holds information about deployed nodes. The base station verifies the keys of nodes that will communicate and transmit data between them. Data transmission occurs between nodes once they get the signal from the base station. The message authentication method will progress data transmission in the network and enhance the throughput compared to RPC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Rawat, P., Singh, K.D., Chaouchi, H., Bonnin, J.M.: Wireless sensor networks: a survey on recent developments and potential synergies. J. Supercomput. 68, 1–48 (2014)
Manjunatha, T.N, Sushma, M.D., Shivakumar, K.M.: Security concepts and sybil attack detection in wireless sensor networks (2016)
Akyildiz, I.F., Kasimoglu, I.H.: Wireless sensor and actor networks: research challenges. Ad Hoc Networks (2014)
Dhamodharan, U.S.R.K., Vayanaperumal, R.: Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method (2015)
Newsome, J., Shi, E., Song, D., Perrig, A.: Te sybil attack in sensor networks: analysis and defenses. In: International Symposium on Information Processing in Sensor Networks (2004)
Ssu, K.F., Wang, W.T., Chang, W.C.: Detecting sybil attacks in wireless sensor networks using neighboring information. Proc. Comput. Networks 53, 3042–3056 (2009)
Demirbas, M., Song, Y.: An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: IEEE Computer Society International Symposium on World of Wireless, Mobile and Multimedia Networks (2006)
Amuthavalli, R., Bhuvaneswaran, R.S.: Detection and prevention of sybil attack in wireless sensor network employing random password comparison method. J. Theoricaland Appl. Inf. Technol. 67(1), 236–246 (2014)
Jangra, A., Priyanka, S.: Securing LEACH protocol from Sybil attack using jakes channel scheme (JCS). In: International Conferences on Advances in ICT for Emerging Regions (2011)
Rafeh, R., Khodadadi, M.: Detecting Sybil nodes in wireless sensor networks using two-hop messages. Indian J. Sci. Technol. 7(9), 1359–1368 (2014)
Jamshidi, M., Ranjbari, M., Esnaashari, M., Qader, N.N., Meybodi, M.R.: Sybil node detection in mobile wireless sensor networks using observer nodes. Int. J. Inf. Visualization 2(3), 159–165 (2018)
Birami, K.S.: Sybil attack in Wireless Sensor Network (2016)
Sharmila, S., Umamaheswari, G.: Detection of Sybil attack in Mobile Wireless Sensor networks. Int. J. Eng. Sci. Adv. Technol. 2(2), 256–262 (2012)
Douceur, J.R.: The sybil attack. In: International Workshop on Peer-to-Peer Systems, pp. 251–260. Springer, Heidelberg (2002)
Sharmila, S., Umamaheswari, G.: Detection of sybil attack in mobile wireless sensor networks. Int. J. Eng. Sci. Adv. Technol., 256–262 (2017)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)
Manjunatha, T.N., Sushma, M.D., Shivakumar, K.M.: Sybil Attack Detection Through on Demand Distance Vector Based Algorithm in Wireless Sensor Networks (2015)
Triki, B., Rekhis, S., Boudriga, N.: An RFID based system for the detection of sybil attack in military wireless sensor networks. In: Computer Applications and Information Systems (wccais), World Congress on, pp. 1–2. IEEE (2014)
Sujatha, V., Anita, E.M.: Detection of sybil attack in wireless sensor network (2015)
Sharmila, S., Umamaheswari, G.: Detection of Sybil Attack in Mobile Wireless Sensor Networks (2016)
Muraleedharan, R., Ye, X., Osadciw, L.A.: Prediction of Sybil Attack on WSN using Bayesian Network and Swarm Intelligence. Wireless Sensing and Processing (2008)
Jamshidi, M., Esnaashari, M., Meybodi, M.R.: An algorithm for defending sybil attacks based on client puzzles and learning automata for wireless sensor networks. In: 18th National Conference of Computer Society of Iran (2017)
Sarigiannidis, P., Karapistoli, E., Economides, A.A.: Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, pp. 7560–7572 (2015)
de Sales, T.B.M., Perkusich, A., de Sales, L.M., de Almeida, H.O., Soares, G., de Sales, M.: ASAP-V: a privacy-preserving authentication and sybil detection protocol for VANETs. Inf. Sci. 23(4), 208–224 (2016)
Pecori, R.: S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia. Comput. Netw. 94, 205–218 (2016)
Prasad, K., Mallick, C.: Mobile agent based sybil attack detection algorithm for wireless sensor network. In: International Conference on Emergent Trends in Computing and Communication (2015)
Jamshidi, M., Zangeneh, E., Esnaashari, M., Meybodi, M.R.: A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Comput. Electr. Eng. 64, 220–232 (2017)
Angappan, A., Saravanabava, T.P.: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN. J. Ambient Intell. Humanized Comput. (2020)
Acknowledgments
We are grateful for the support of the Department of Electrical and Computer Engineering at the New York University of Abu Dhabi (NYU).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jlassi, W., Haddad, R., Bouallegue, R., Shubair, R. (2021). A Novel Dynamic Authentication Method for Sybil Attack Detection and Prevention in Wireless Sensor Networks. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 225. Springer, Cham. https://doi.org/10.1007/978-3-030-75100-5_46
Download citation
DOI: https://doi.org/10.1007/978-3-030-75100-5_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-75099-2
Online ISBN: 978-3-030-75100-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)