Skip to main content
Log in

RETRACTED ARTICLE: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 06 June 2022

This article has been updated

Abstract

Wireless sensor networks (WSN) are generally employed in unattended hostile areas such as forest monitoring, agriculture fields, military battlefields. An adversary can physically capture WSN deployed in a hostile environment. Once an adversary captures a node, the cryptographic information and the software program can be easily extracted. Also, the adversary can reprogram the software inside the node. After reprogramming, the adversary can replicate and deploy the node with multiple identities to do malicious activities. This kind of identity theft attack can be classified as Clone attack or Sybil attack. These identity theft attacks are addressed by many distributed, centralised and localised solutions. Most of these solutions utilise private/public key, and symmetric key algorithms are energy and memory demanding, while the WSN are energy and memory constrained. This paper proposes a novel Sybil attack detection protocol (NoSad) to identify and isolate the Sybil attack in WSN. This protocol is a localised method using intra-cluster communication and RSSI value to identify the Sybil node. The proposed protocol is simulated extensively with various topologies, and obtained results prove that the protocol is highly efficient in detection ratio, energy utilisation, memory usage, computation and communication requirement. This protocol may be used in any resource-constrained WSN to obtain a satisfactory result. This work provides a solution for different scenarios of Sybil node position to counter the Sybil attack in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Change history

References

  • AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-018-0885-1

    Article  Google Scholar 

  • Almas Shehni R, Faez K, Eshghi F, Kelarestaghi M (2017) A new lightweight watchdog-based algorithm for detecting Sybil nodes in mobile WSNs. Future Internet 10(1):1–17

    Article  Google Scholar 

  • Brooks R, Govindaraju PY, Pirretti M, Vijaykrishnan N, Kandemir MT (2007) On the detection of clones in sensor networks using random key predistribution. IEEE Trans Syst Man Cybernet Part C 37(6):1246–1258

    Article  Google Scholar 

  • Cheraghlou MN, Haghparast M (2014) A novel fault-tolerant leach clustering protocol for wireless sensor networks. J Circuits Syst Comput 23(03):1450041

    Article  Google Scholar 

  • Conti M, Di Pietro R, Mancini RL, Mei A (2011) Distributed detection of clone attacks in wireless sensor networks. IEEE Trans Dependable Secure Comput 8(5):685–698

    Article  Google Scholar 

  • Demirbas M, Youngwhan S (2006) An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: 2006 international symposium on a world of wireless, mobile and multimedia networks (WoWMoM’06). IEEE

  • Diaz S, Mendez D, Kraemer R (2019) A review on self-healing and self-organizing techniques for wireless sensor networks. J Circuits Syst Comput 28(05):1930005

    Article  Google Scholar 

  • Douceur JR (2002) The sybil attack. In: International workshop on peer-to-peer systems. Springer, Berlin, Heidelberg, pp 251–260

    Chapter  Google Scholar 

  • Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, pp 41–47

  • Gomathy V, Padhy N, Samanta D et al (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-020-01797-3

    Article  Google Scholar 

  • Jamshidi M, Zangeneh E, Esnaashari M, Meybodi MR (2017) A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Comput Electr Eng 64:220–232

    Article  Google Scholar 

  • Jamshidi M, Ranjbari M, Esnaashari M, Qader NN, Meybodi MR (2018) Sybil node detection in mobile wireless sensor networks using observer nodes. Int J Inform Vis 2(3):159–165

    Google Scholar 

  • Misra S, Myneni S (2010) On identifying power control performing Sybil nodes in wireless sensor networks using RSSI. In: 2010 IEEE global telecommunications conference GLOBECOM 2010. IEEE, pp 1–5

  • Newsome J, Shi E, Song D, Perrig A (2004) The sybil attack in sensor networks: analysis & defenses. In: Third international symposium on information processing in sensor networks, 2004. IPSN 2004. IEEE, pp 259–268

  • Panagiotis S, Karapistoli E, Economides A (2015) Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Syst Appl 42(21):7560–7572

    Article  Google Scholar 

  • Rafeh R, Khodadadi M (2014) Detecting Sybil nodes in wireless sensor networks using twohop messages. Indian J Sci Technol 7(9):1359–1368

    Article  Google Scholar 

  • Ramachandran S, Shanmugan V (2011) Impact of Sybil and wormhole attacks in location based geographic multicast routing protocol for wireless sensor networks. J Comput Sci 7(7):973–979

    Article  Google Scholar 

  • Saravanan M, Kalidoss R, Partibane B et al (2019) Mitigation of mutual exclusion problem in 5G new radio standards by token and non token based algorithms. Cluster Comput 22:11319–11327

    Article  Google Scholar 

  • Ssu K-F, Wang W-T, Chang W-C (2009) Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput Netw 53(18):3042–3056

    Article  Google Scholar 

  • Wang J, Yang G, Sun Y, Chen S (2007) Sybil attack detection based on RSSI for wireless sensor network. In: 2007 international conference on wireless communications, networking and mobile computing. IEEE, pp 2684–2687

  • Wen M, Li H, Zheng Y-F, Chen K-F (2008) Tdoa-based Sybil attack detection scheme for wireless sensor networks. J Shanghai Univ (English Edition) 12(1):66–70

    Article  Google Scholar 

  • Zhang Q, Wang P, Reeves DS, Ning P (2005) Defending against Sybil attacks in sensor networks. In: 25th IEEE international conference on distributed computing systems workshops. IEEE, pp 185–191

  • Zhang Y, Fan KF, Zhang SB, Mo W (2010) AOA based trust evaluation scheme for sybil attack detection in wsn. Appl Res Comput 27(5):1847–1849

    Google Scholar 

  • Zhong S, Li L, Liu YG, Yang YR (2004) Privacy-preserving location-based services for mobile users in wireless networks. Department of Computer Science, Yale University, Technical Report ALEU/DCS/TR-1297

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arthanareeswaran Angappan.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s12652-022-04070-x

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Angappan, A., Saravanabava, T.P., Sakthivel, P. et al. RETRACTED ARTICLE: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN. J Ambient Intell Human Comput 12, 6567–6578 (2021). https://doi.org/10.1007/s12652-020-02276-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02276-5

Keywords

Navigation