A Novel Code Attestation Scheme Against Sybil Attack in Wireless Sensor Networks

被引:0
|
作者
Makhdoom, Imran [1 ]
Afzal, Mehreen [1 ]
Rashid, Imran [1 ]
机构
[1] Natl Univ Sci & Technol, Dept IS, MCS, Islamabad, Pakistan
关键词
Sybil Attack; code attestation scheme; insider attacks; wireless sensor networks; embedded systems security; trust and security issues in sensor networks;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Wireless Sensor Networks (WSN) due to their distributed nature are vulnerable to various external and insider attacks. Classic cryptographic measures do protect against external attacks to some extent but they fail to defend against insider attacks involving node compromise. A compromised node can be used to launch various attacks of which Sybil Attack is the most prominent. In this paper we carryout a detailed review and analysis of various defenses proposed against Sybil Attack. We identify their strengths and weaknesses and also propose a novel One Way Code Attestation Protocol (OWCAP) for wireless sensors networks, which is an economical and a secure code attestation scheme that protects not only against Sybil Attack but also against majority of the insider attacks.
引用
收藏
页码:1 / 6
页数:6
相关论文
共 50 条
  • [21] Location verification based defense against sybil attack in sensor networks
    Mukhopadhyay, Debapriyay
    Saha, Indranil
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 509 - 521
  • [22] Sybil Attack Type Detection in Wireless Sensor Networks based on Received Signal Strength Indicator detection scheme
    Marian, Salavat
    Mircea, Popa
    2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 121 - 124
  • [23] Digital signature scheme against internal and external attack for wireless sensor networks
    Yu B.-B.
    Hu L.
    Chi L.
    Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (05): : 1676 - 1681
  • [24] Security against Sybil Attack in Wireless Sensor Network through Location Verification
    Saha, Indranil
    Mukhopadhyay, Debapriyay
    DISTRIBUTED COMPUTING AND NETWORKING, 2009, 5408 : 187 - +
  • [25] Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 698 - 702
  • [26] An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks
    Triki, Bayrem
    Rekhis, Slim
    Boudriga, Noureddine
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [27] A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
    Arshad, Akashah
    Hanapi, Zurina Mohd
    Subramaniam, Shamala
    Latip, Rohaya
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 33
  • [28] Detecting Sybil Attack based on State Information in Underwater Wireless Sensor Networks
    Li, Xun
    Han, Guangjie
    Qian, Aihua
    Shu, Lei
    Rodrigues, Joel
    2013 21ST INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM 2013), 2013, : 116 - 120
  • [29] Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    2015 IEEE 12TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2015, : 91 - 95
  • [30] Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack
    Raja, K. Nirmal
    Beno, M. Maraline
    JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (07)