Detecting and Confining Sybil Attack in Wireless Sensor Networks Based on Reputation Systems Coupled with Self-organizing Maps

  • Zorana Banković
  • David Fraga
  • José M. Moya
  • Juan Carlos Vallejo
  • Álvaro Araujo
  • Pedro Malagón
  • Juan-Mariano de Goyeneche
  • Daniel Villanueva
  • Elena Romero
  • Javier Blesa
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 339)

Abstract

The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this work we propose to couple reputation systems with agents based on self-organizing map algorithm trained for detecting outliers in data. The response of the system consists in assigning low reputation values to the compromised node rendering them isolated from the rest of the network. The main improvement of this work consists in the way of calculating reputation, which is more flexible and discriminative in distinguishing attacks from normal behavior. Self-organizing map algorithm deploys feature space based on sequences of sensor outputs. Our solution offers many benefits: scalable solution, fast response to adversarial activities, ability to detect unknown attacks, high adaptability and low consumption. The testing results demonstrate its high ability in detecting and confining Sybil attack.

Keywords

wireless sensor networks reputation system self-organizing maps outlier detection 

References

  1. 1.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks, April 26-27, pp. 259–268. ACM, Berkeley (2004)Google Scholar
  2. 2.
    Rieck, K., Laskov, P.: Linear Time Computation of Similarity for Sequential Data. J. Mach. Learn. Res. 9, 23–48 (2008)Google Scholar
  3. 3.
    Bar El, H.: Introduction to Side Channel Attacks. Discretix Technologies Ltd. (2003)Google Scholar
  4. 4.
    Moya, J.M., et al.: Improving Security for SCADA Sensor Networks with Reputation Systems and Self-Organizing Maps. Sensors 9, 9380–9397 (2009)CrossRefGoogle Scholar
  5. 5.
    Banković, Z., Moya, M.J.M., Araujo, A., Fraga, D., Vallejo, J.C., de Goyeneche, J.M.: Distributed Intrusion Detection System for WSNs based on a Reputation System coupled with Kernel Self-Organizing Maps. Int. Comp. Aided Design (to be published)Google Scholar
  6. 6.
    Muñoz, A., Muruzábal, J.: Self-Organizing Maps for Outlier Detection. Neurocomputing 18(1-3), 33–60 (1998)CrossRefGoogle Scholar

Copyright information

© IFIP 2010

Authors and Affiliations

  • Zorana Banković
    • 1
  • David Fraga
    • 1
  • José M. Moya
    • 1
  • Juan Carlos Vallejo
    • 1
  • Álvaro Araujo
    • 1
  • Pedro Malagón
    • 1
  • Juan-Mariano de Goyeneche
    • 1
  • Daniel Villanueva
    • 1
  • Elena Romero
    • 1
  • Javier Blesa
    • 1
  1. 1.ETSI TelecomunicaciónUniversidad Politécnica de MadridMadridSpain

Personalised recommendations