Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information

作者: Panagiotis Sarigiannidis , Eirini Karapistoli , Anastasios A. Economides

DOI: 10.1016/J.ESWA.2015.05.057

关键词:

摘要: Development of a novel rule-based Sybil attack detection system for large-scale WSNs.Integration UWB ranging-features with expert knowledge in the process.Development defense scheme against direct, simultaneous attacks.Derivation rigorous analytic framework to determine performance.Introduction an accurate simulation environment validate analysis. Security is becoming major concern many mission-critical applications wireless sensor networks (WSNs) are envisaged support. The inherently vulnerable characteristics WSNs appoint them susceptible various types attacks. This work restrains its focus on how defend particularly harmful form attack, attack. attacks can severely deteriorate network performance and compromise security by disrupting networking protocols. paper presents anomaly system, called RADS, which monitors timely detects WSNs. At core, proposed relies ultra-wideband (UWB) ranging-based algorithm that operates distributed manner requiring no cooperation or information sharing between nodes order perform tasks. feasibility approach proven analytically, while RADS exposing extensively assessed both mathematically numerically. obtained results demonstrate achieves high accuracy low false alarm rate appointing it promising ADS candidate this class networks.

参考文章(35)
N. Boris Margolin, Brian Neil Levine, Clay Shields, A Survey of Solutions to the Sybil Attack ,(2006)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
M. Demirbas, Youngwhan Song, An RSSI-based scheme for sybil attack detection in wireless sensor networks world of wireless, mobile and multimedia networks. pp. 564- 570 ,(2006) , 10.1109/WOWMOM.2006.27
Kai Xing, Shyaam Sundhar Rajamadam Srinivasan, Major Jose “Manny” Rivera, Jiang Li, Xiuzhen Cheng, Attacks and Countermeasures in Sensor Networks: A Survey Springer, Boston, MA. pp. 251- 272 ,(2010) , 10.1007/978-0-387-73821-5_11
Debapriyay Mukhopadhyay, Indranil Saha, Location verification based defense against sybil attack in sensor networks international conference of distributed computing and networking. pp. 509- 521 ,(2006) , 10.1007/11947950_56
B. Parno, A. Perrig, V. Gligor, Distributed detection of node replication attacks in sensor networks ieee symposium on security and privacy. pp. 49- 63 ,(2005) , 10.1109/SP.2005.8
Alexander Becher, Zinaida Benenson, Maximillian Dornseif, Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks Security in Pervasive Computing. pp. 104- 118 ,(2006) , 10.1007/11734666_9
Kuo-Feng Ssu, Wei-Tong Wang, Wen-Chung Chang, Detecting Sybil attacks in Wireless Sensor Networks using neighboring information Computer Networks. ,vol. 53, pp. 3042- 3056 ,(2009) , 10.1016/J.COMNET.2009.07.013
Weichao Wang, Aidong Lu, Visualization assisted detection of sybil attacks in wireless networks Proceedings of the 3rd international workshop on Visualization for computer security - VizSEC '06. pp. 51- 60 ,(2006) , 10.1145/1179576.1179585
Chris Piro, Clay Shields, Brian Neil Levine, Detecting the Sybil Attack in Mobile Ad hoc Networks 2006 Securecomm and Workshops. pp. 1- 11 ,(2006) , 10.1109/SECCOMW.2006.359558