Abstract
Wireless sensor networks (WSN) are generally employed in unattended hostile areas such as forest monitoring, agriculture fields, military battlefields. An adversary can physically capture WSN deployed in a hostile environment. Once an adversary captures a node, the cryptographic information and the software program can be easily extracted. Also, the adversary can reprogram the software inside the node. After reprogramming, the adversary can replicate and deploy the node with multiple identities to do malicious activities. This kind of identity theft attack can be classified as Clone attack or Sybil attack. These identity theft attacks are addressed by many distributed, centralised and localised solutions. Most of these solutions utilise private/public key, and symmetric key algorithms are energy and memory demanding, while the WSN are energy and memory constrained. This paper proposes a novel Sybil attack detection protocol (NoSad) to identify and isolate the Sybil attack in WSN. This protocol is a localised method using intra-cluster communication and RSSI value to identify the Sybil node. The proposed protocol is simulated extensively with various topologies, and obtained results prove that the protocol is highly efficient in detection ratio, energy utilisation, memory usage, computation and communication requirement. This protocol may be used in any resource-constrained WSN to obtain a satisfactory result. This work provides a solution for different scenarios of Sybil node position to counter the Sybil attack in WSN.
Similar content being viewed by others
Change history
06 June 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s12652-022-04070-x
References
AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0885-1
Almas Shehni R, Faez K, Eshghi F, Kelarestaghi M (2017) A new lightweight watchdog-based algorithm for detecting Sybil nodes in mobile WSNs. Future Internet 10(1):1–17
Brooks R, Govindaraju PY, Pirretti M, Vijaykrishnan N, Kandemir MT (2007) On the detection of clones in sensor networks using random key predistribution. IEEE Trans Syst Man Cybernet Part C 37(6):1246–1258
Cheraghlou MN, Haghparast M (2014) A novel fault-tolerant leach clustering protocol for wireless sensor networks. J Circuits Syst Comput 23(03):1450041
Conti M, Di Pietro R, Mancini RL, Mei A (2011) Distributed detection of clone attacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 8(5):685–698
Demirbas M, Youngwhan S (2006) An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: 2006 international symposium on a world of wireless, mobile and multimedia networks (WoWMoM’06). IEEE
Diaz S, Mendez D, Kraemer R (2019) A review on self-healing and self-organizing techniques for wireless sensor networks. J Circuits Syst Comput 28(05):1930005
Douceur JR (2002) The sybil attack. In: International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, pp 251–260
Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, pp 41–47
Gomathy V, Padhy N, Samanta D et al (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01797-3
Jamshidi M, Zangeneh E, Esnaashari M, Meybodi MR (2017) A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Comput Electr Eng 64:220–232
Jamshidi M, Ranjbari M, Esnaashari M, Qader NN, Meybodi MR (2018) Sybil node detection in mobile wireless sensor networks using observer nodes. Int J Inform Vis 2(3):159–165
Misra S, Myneni S (2010) On identifying power control performing Sybil nodes in wireless sensor networks using RSSI. In: 2010 IEEE global telecommunications conference GLOBECOM 2010. IEEE, pp 1–5
Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: Third international symposium on information processing in sensor networks, 2004. IPSN 2004. IEEE, pp 259–268
Panagiotis S, Karapistoli E, Economides A (2015) Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Syst Appl 42(21):7560–7572
Rafeh R, Khodadadi M (2014) Detecting Sybil nodes in wireless sensor networks using twohop messages. Indian J Sci Technol 7(9):1359–1368
Ramachandran S, Shanmugan V (2011) Impact of Sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks. J Comput Sci 7(7):973–979
Saravanan M, Kalidoss R, Partibane B et al (2019) Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms. Cluster Comput 22:11319–11327
Ssu K-F, Wang W-T, Chang W-C (2009) Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput Netw 53(18):3042–3056
Wang J, Yang G, Sun Y, Chen S (2007) Sybil attack detection based on RSSI for wireless sensor network. In: 2007 international conference on wireless communications, networking and mobile computing. IEEE, pp 2684–2687
Wen M, Li H, Zheng Y-F, Chen K-F (2008) Tdoa-based Sybil attack detection scheme for wireless sensor networks. J Shanghai Univ (English Edition) 12(1):66–70
Zhang Q, Wang P, Reeves DS, Ning P (2005) Defending against Sybil attacks in sensor networks. In: 25th IEEE international conference on distributed computing systems workshops. IEEE, pp 185–191
Zhang Y, Fan KF, Zhang SB, Mo W (2010) AOA based trust evaluation scheme for sybil attack detection in wsn. Appl Res Comput 27(5):1847–1849
Zhong S, Li L, Liu YG, Yang YR (2004) Privacy-preserving location-based services for mobile users in wireless networks. Department of Computer Science, Yale University, Technical Report ALEU/DCS/TR-1297
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-04070-x
About this article
Cite this article
Angappan, A., Saravanabava, T.P., Sakthivel, P. et al. RETRACTED ARTICLE: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN. J Ambient Intell Human Comput 12, 6567–6578 (2021). https://doi.org/10.1007/s12652-020-02276-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02276-5