It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Detecting the Sybil Attack in Wireless Sensor Network :Survey | Pramod | INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY

Detecting the Sybil Attack in Wireless Sensor Network :Survey

A.V Pramod, Md. Abdul Azeem, M. Om Prakash

Abstract


Mobility is frequently a problem for providing security services  in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passively monitor traffic in the network can able to detect a Sybil attacker which uses a number of network identities simultaneously. We can do through simulation that this detection can be done by a single node, or multiple trusted nodes can join to improve the accuracy of detection. We then show that although the detection mechanism will falsely identify groups of nodes traveling together as a Sybil attacker, we can extend the protocol to monitor collisions at the MAC level to differentiate between a single attacker spoofing many addresses and a group of nodes traveling in close proximity.


Keywords


WSN; PKI; PASID; PASID-GD

Full Text:

PDF

References


S. Buchegger and J. Le Boudec. A Robust Reputation System for P2P and Mobile Ad hoc Networks. In Proc. Wkshp Economics of Peer-to-Peer Systems, June 2004.

J. R. Douceur. The Sybil Attack. In Intl Wkshp on Peer-to- Peer Systems, March 2002.

A. Cheng and E. Friedman. Sybilproof Reputation Mechanisms In ACM Wkshp on the Economics of Peer-to-Peer Systems, August 2005.

J. Newsome, E. Shi, D. Song, and A. Perrig. The Sybil Attack in Sensor Networks: Analysis & Defenses. In Proc. Intl Symp on Information Processing in Sensor Networks, 2004.

N. Mathewson, P. Syverson, and R. Dingledine. TOR: The Second-Generation Onion Router. In Proc. USENIX Security Symp, August 2004.

C. E. Perkins and E. M. Royer. Ad hoc On-Demand Distance Vector Routing. In Proc. WMCSA, Feb. 1999.

D. Johnson and D. Maltz. Dynamic Source Routing in Ad hoc Wireless Networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.

Y. Hu and A. Perrig. A Survey of Secure Wireless Ad hoc Routing. IEEE Security & Privacy, 2(3):28–39, May/June 2004.

K. Sanzgiri, B. Dahill, D. LaFlamme, B. N. Levine, C. Shields, and E. Belding-Royer. A Secure Routing Protocol for Ad hoc Networks. JSAC Special Issue on Ad hoc Networks, March 2005 .

Y. Hu, D. Johnson, and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks. In Proc. Wkshp on Mobile Computing Systems and

Applications, Jun. 2002.

P. Papadimitratos and Z. Haas. Secure Link State Routing for Mobile Ad hoc Networks. In Proc. Symp on Applications and the Internet Wkshps, January 2003.

P. Papadimitratos and Z. Haas. Secure Routing for Mobile Ad hoc Networks. In Proc. Communication Networks and Distributed Systems Modeling and Simulation Conference, Jan. 2002.

D. Kotz, C. Newport, R. Gray, J. Liu, Y. Yuan, and C. Elliott. Experimental evaluation of wireless simulation assumptions. In Proc. ACM/IEEE Intl Symp on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pages 78–82, October 2004.

S. McCanne and S. Floyd. Network Simulator Version 2. http://www.isi.edu/nsnam/ns.


Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

@ 2010 onward COUNCIL FOR INNOVATIVE RESEARCH

All rights reserved with Journal Manager CIR.

To make sure that you can receive messages from us, please add our domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support editor@cirworld.com, editorcir@gmail.com