Advertisement

An Enhanced RSSI-Based Detection Scheme for Sybil Attack in Wireless Sensor Networks

  • Yinghong Liu
  • Yuanming WuEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 69)

Abstract

In Sybil attack, a single faulty entity illegitimately claims multiple identities to gather more packets, which is extremely detrimental to network performance. This paper proposes an enhanced RSSI-based detection scheme with an innovative detection framework, including suspicious node screening phase and Sybil node verification phase. Introducing reputation module and adaptive threshold, malicious nodes are figured and marked by monitoring node promptly, which is essential to guarantee the reliability of detection nodes. In the collaborative work, monitoring node screens out the suspicious Sybil nodes firstly, and then selects two high reputation nodes for every suspicious node as detection nodes to carry out the verification of Sybil nodes. Theoretical analysis and simulation results show that our scheme achieves fast locating ability and high detection accuracy with low energy consumption.

Keywords

Sybil node RSSI Reputation model Adaptive threshold Monitoring node Detection node 

References

  1. 1.
    Zhou, H., Wu, Y., Feng, L., Liu, D.: A Security mechanism for cluster-based WSN against selective forwarding. Sensors 16(9), 1537–1553 (2016)CrossRefGoogle Scholar
  2. 2.
    Wu, Y.M.: An energy-balanced loop-free routing protocol for distributed wireless sensor networks. Int. J. Sens. Netw. 23(1), 123–131 (2017)Google Scholar
  3. 3.
    Kuo, F.S., Wei, T.W., Wen, C.C.: Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput. Netw. 53(18), 3042–3056 (2009)CrossRefGoogle Scholar
  4. 4.
    Sarigiannidis, P., Karapistoli, E., Economides, A.A.: Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Syst. Appl. 42(21), 7560–7572 (2015)CrossRefGoogle Scholar
  5. 5.
    Murat, D., Youngwhan, S.: An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: WoWMoM 2006, Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 564–570. Institute of Electrical and Electronics Engineering Computer Society, Buffalo-Niagara Falls (2006)Google Scholar
  6. 6.
    Lv, S.H., Wang, X.D., Zhou, X., Zhou, X.M.: Detecting the Sybil attack cooperatively in wireless sensor networks. In: Proceedings of the 2008 International Conference on Computational Intelligence and Security, CIS 2008, pp. 442–446. IEEE Computer Society, Suzhou (2008)Google Scholar
  7. 7.
    Liu, R.X., Wang, Y.L.: A new Sybil attack detection for wireless body sensor network. In: Proceedings of the 2014 10th International Conference on Computational Intelligence and Security, CIS 2014, pp. 367–370. Institute of Electrical and Electronics Engineers Inc., Kunming (2014)Google Scholar
  8. 8.
    Maarlan, S., Mircea, P.: Sybil attack type detection in wireless sensor networks based on received signal strength indicator detection scheme. In: SACI 2015, Proceedings of the 10th Jubilee IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 121–124. Institute of Electrical and Electronics Engineers Inc., Timisoara (2015)Google Scholar
  9. 9.
    Jan, M.A., Nanda, P., He, X.J., Liu, R.P.: A Sybil attack detection scheme for a centralized clustering-based hierarchical network. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 318–325. Institute of Electrical and Electronics Engineers Inc., Helsinki (2015)Google Scholar
  10. 10.
    Yuan, Y.L., Huo, L.W., Wang, Z.X., Hongefe, D.: Secure APIT localization scheme against Sybil attacks in distributed wireless sensor networks. IEEE Access 6, 27629–27636 (2018)CrossRefGoogle Scholar
  11. 11.
    Yu, Y.L., Li, K.Q., Zhou, W.L.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)CrossRefGoogle Scholar
  12. 12.
    Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, pp. 1–17 (2002)Google Scholar
  13. 13.
    Hu, Y., Wu, Y.M., Wang, H.S.: Detection of insider selective forwarding attack based on monitor node and trust mechanism in WSN. Wirel. Sens. Netw. 6, 237–248 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.School of Automation EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina
  2. 2.School of Optoelectronic Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduChina

Personalised recommendations