Abstract
A Sybil attack, where a malicious node creates multiple fake or captured identities, is one of the most well-known attacks against wireless sensor networks (WSNs). This attack can leave devastating effects on operational and routing protocols, such as voting, data aggregation, resource allocation, and misbehavior detection. In this paper, a simple and precise algorithm for detecting Sybil attacks in mobile WSNs is proposed. Considering the rapid growth of Internet of Things (IoTs) devices and WSNs’ popularity, the threat from this attack is serious. The main underlying idea of the proposed algorithm is to use neighbors’ information and observer nodes to detect Sybil nodes during the network lifetime. In the proposed algorithm, some observer nodes first walk the network and record necessary information about other nodes. Each observer node then uses this collected information to detect Sybil nodes. The proposed algorithm is compared with other algorithms according to criteria including memory, communication, and computation overhead. Also, the proposed algorithm is implemented with the J-SIM simulator, and its performance is compared in a series of experiments with other algorithms using the criteria of true- and falsedetection rates. The simulation results indicate that the proposed algorithm can detect 100% of the Sybil nodes, so its false-detection rate is 0%, regarding the study assumptions.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: IEIE Transactions on Smart Processing & Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.