Detecting Sybil nodes in stationary wireless sensor networks using learning automaton and client puzzles

被引:6
|
作者
Jamshidi, Mojtaba [1 ]
Esnaashari, Mehdi [2 ]
Darwesh, Aso Mohammad [3 ]
Meybodi, Mohammad Reza [4 ]
机构
[1] Islamic Azad Univ, Fac Comp & Informat Technol Engn, Qazvin Branch, Qazvin, Iran
[2] KN Toosi Univ Technol, Fac Comp Engn, Tehran, Iran
[3] Univ Human Dev, Dept Informat Technol, Sulaymaniyah, Iraq
[4] Amirkabir Univ Technol, Comp Engn & Informat Technol Dept, Tehran, Iran
关键词
protocols; wireless sensor networks; computer network security; security of data; resource allocation; telecommunication security; Sybil nodes; stationary wireless sensor networks; learning automaton; harmful attack; Sybil attack; malicious node; network protocols; client puzzles theory; network lifetime; puzzle solving time; sending solving puzzles; false detection rate; neighbour-based algorithm; ALGORITHM; ATTACKS; DEFEND;
D O I
10.1049/iet-com.2018.6036
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A well-known harmful attack against wireless sensor networks (WSNs) is the Sybil attack. In a Sybil attack, WSN is destabilised by a malicious node which forges a large number of fake identities to disrupt network protocols such as routing, data aggregation, and fair resource allocation. In this study, the authors suggest a new algorithm based on a composition of learning automaton (LA) model and client puzzles theory to identify Sybil nodes in stationary WSNs. In the proposed algorithm, each node sends puzzles to its neighbours periodically during the network lifetime and tries to identify Sybil nodes among them, considering their response time (puzzle solving time). In this algorithm, each node equipped with a LA to reduce the communication and computation overhead of sending and solving puzzles. The proposed algorithm has been simulated using J-SIM simulator and simulation results have shown that the proposed algorithm can detect 100% of Sybil nodes and the false detection rate is about 5% on average. Also, the performance of the proposed algorithm has been compared to a wellknown neighbour-based algorithm through experiments and the results have shown that the proposed algorithm is significantly better than this algorithm in terms of detection and false detection rates.
引用
收藏
页码:1988 / 1997
页数:10
相关论文
共 50 条
  • [1] A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks
    Jamshidi, Mojtaba
    Zangeneh, Ehsan
    Esnaashari, Mehdi
    Meybodi, Mohammad Reza
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 220 - 232
  • [2] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [3] DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS
    Vamsi, P. Raghu
    Kant, Krishna
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02): : 651 - 680
  • [4] Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 834 - +
  • [5] Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks
    Lv, Shaohe
    Wang, Xiaodong
    Zhao, Xin
    Zhou, Xingming
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 442 - 446
  • [6] Detecting and preventing Sybil attacks in wireless sensor networks
    Wadii, Jlassi
    Rim, Haddad
    Ridha, Bouallegue
    2019 IEEE 19TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS 2019), 2019,
  • [7] Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding
    Wang, Weichao
    Pu, Di
    Wyglinski, Alex
    2010 IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS DSN, 2010, : 21 - 30
  • [8] On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI
    Misra, Satyajayant
    Myneni, Sowmya
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [9] Detecting compromised nodes in wireless sensor networks
    Mathews, Mary
    Song, Min
    Shetty, Sachin
    McKenzie, Rick
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 273 - +
  • [10] Detecting phantom nodes in wireless sensor networks
    Hwang, Joengmin
    He, Tian
    Kifn, Yongdae
    INFOCOM 2007, VOLS 1-5, 2007, : 2391 - +