Abstract

Wide-spread deployment of Wireless Sensor Networks (WSN) necessitates special attention to security issues, amongst which Sybil attacks are the most important ones. As a core to Sybil attacks, malicious nodes try to disrupt network operations by creating several fabricated IDs. Due to energy consumption concerns in WSNs, devising detection algorithms which release the sensor nodes from high computational and communicational loads are of great importance. In this paper, a new computationally lightweight watchdog-based algorithm is proposed for detecting Sybil IDs in mobile WSNs. The proposed algorithm employs watchdog nodes for collecting detection information and a designated watchdog node for detection information processing and the final Sybil list generation. Benefiting from a newly devised co-presence state diagram and adequate detection rules, the new algorithm features low extra communication overhead, as well as a satisfactory compromise between two otherwise contradictory detection measures of performance, True Detection Rate (TDR) and False Detection Rate (FDR). Extensive simulation results illustrate the merits of the new algorithm compared to a couple of recent watchdog-based Sybil detection algorithms.

Highlights

  • Nowadays we are witnessing the emergence of new Wireless Sensor Networks (WSN) applications in different fields such as military, urban services, the environment, medicine, explorations and Intrusion Detection Systems (IDS)

  • The subject network consists of two sets of nodes, normal sensor nodes (SN) which perform sensing, routing, and data aggregation, and watchdog nodes (WD) which are responsible for network monitoring and detecting Sybil IDs

  • A Typical Example: As a typical example, assume a scenario in which there is a sensor network consisting of four normal nodes (ID1, ID2, ID6, and ID7), four WDs (W1, W2, W3, and W4 one of which plays the role of the designated WD), and one malicious node

Read more

Summary

Introduction

Nowadays we are witnessing the emergence of new WSN applications in different fields such as military, urban services, the environment, medicine, explorations and Intrusion Detection Systems (IDS). Decentralized methods make use of some pre-authenticated nodes, sometimes called watchdogs, trusted, etc., which administrate the attack detection operation. These watchdogs can be fixed or mobile. From a networking layer stack point of view, Sybil attack detection techniques can be grouped into PHY-layer-based and upper-layers-based techniques The former make use of the parameters of the radio signal and the second layer’s node identity information. We propose a lightweight, sufficiently accurate, and practical watchdog-based algorithm for detecting Sybil nodes in mobile WSNs. Our algorithm, considered as a neighborhood -based technique, does not need any centralized base station and does not require transmission of neighborhood data (neighborhood table) from normal nodes to watchdog nodes.

Related Works
Problem Statement and Attack Model Assumptions
Proposed Algorithm
Nodes move and then stop after a prespecified time step
A Typical Example
Measures of performance
Simulation Setup
Evaluation
Comparison
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.