Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Survey on Literature Detection Methods of Sybil Attack In WSN

Author : Omar Badeea Baban 1

Date of Publication :16th October 2017

Abstract: A wireless Sensor Network (WSN) is a distributed network of small sensor nodes deployed in large numbers to monitor the environment or other systems by the measurement of physical parameters such as temperature, pressure, or relative humidity. These nodes by monitoring collect detailed information about the physical environment in which they are installed, and then transmit the collected data to the Base Station (BS). BS is a gateway from sensor networks to the outside world. It passes the data it receives from sensor nodes to the server from where end-user can access them. Security in WSN is a greater challenge due to the processing limitations of sensor nodes and nature of wireless links. Extensive use of WSNs is giving rise to different types of threats. To defend against the threats proper security schemes are required. Traditionally security is implemented through hardware or software and is generally achieved through cryptographic methods. Limited area, nature of links, limited processing, power and memory of WSNs leads to strict constraints on the selection of cryptographic techniques. The Sybil attack is one of the dangerous attacks against sensor and ad-hoc networks, where a node illegitimately claims multiple identities. A Sybil attacker can cause damage to the ad hoc networks in several ways. For example, a Sybil attacker can disrupt location-based or multipath routing by participating in the routing, giving the false impression of being distinct nodes on different locations or paths. In wireless sensor networks, a Sybil attacker can change the whole aggregated reading outcome by contributing many times as a different node. In voting-based schemes, a Sybil attacker can control the result by rigging the polling process using multiple virtual identities. In vehicular ad hoc networks, Sybil attackers can create an arbitrary number of virtual nonexistent vehicles and transmit false information in the network to give a fake impression of traffic congestion in order to divert traffic.

Reference :

    1. A. Babu Karuppiah and A. Raja Prakash, “SYBILSECURE: an energy efficient sybil attack detection technique in wireless sensor network,” International Journal of Information Sciences and Techniques (IJIST) Vol. 4, No. 3, May 2014.
    2. Dr. Shu Yinbiao, Dr. Kang Lee, Mr. Peter Lanctot,” Internet of Things: Wireless Sensor Network ” White Paper 2014 International Electrotechnical CommissionIEC, China (http://www.iec.ch).
    3. John R. Douceur, The attack, (2002), 251–260. http://shodhganga.inflibnet.ac.in/bitstream/10603/22912/7 /07_chapter_01.pdf
    4. Prabhjotkaur, Aayushi Chada, Sandeep Singh,” Review Paper of Detection and Prevention of Sybil Attack in WSN Using Centralizedids”, International Journal of Engineering Science and Computing (IJESC), July 2016, Volume 6 Issue No. 7
    5. R. Amuthavalli and R. S. Bhuvaneswaran , “ Detection and Prevention of Sybil attack in Wireless Sensor Network Employing Random Password Comparison Method,” Journal of Theoretical and Applied Information Technology, September 2014, Vol. 67, No.1, ISSN: 1992- 8645.
    6. R. Amuthavalli & R. S. Bhuvaneswaran, “Genetic Algorithm Enabled Prevention of Sybil Attacks for LEACH-E”, in Modern Applied Science Vol. 9, No. 9; 2015, Published by Canadian Center of Science and Education.
    7. Raed, M. B. H., &Abdalraheem, A. I. (2013). A Survey on LEACH-Based Energy Aware Protocols for Wireless Sensor Networks. Journal of Communications, 8(3).
    8. Sweety Saxena and Prof. Vikas Sejwar, “ Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks,” International Journal of Grid Distribution Computing Vol. 7, No. 5 (2014), pp.15- 30, ISSN: 2005-4262.
    9. Udaya Suriya Raj Kumar Dhamodharan and Rajamani Vayanaperumal, “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method,” Scientific World Journal, 2015.
    10. V. Sujatha and E. A. Mary Anita, “Detection of Sybil Attack in Wireless Sensor Network,” Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 202-206, 2015, ISSN 1990- 9233.

Recent Article