scholarly journals Detecting the Sybil Attack in Wireless Sensor Network :Survey

2012 ◽  
Vol 3 (1) ◽  
pp. 158-161 ◽  
Author(s):  
A.V Pramod ◽  
Md. Abdul Azeem ◽  
M. Om Prakash

Mobility is frequently a problem for providing security services  in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passively monitor traffic in the network can able to detect a Sybil attacker which uses a number of network identities simultaneously. We can do through simulation that this detection can be done by a single node, or multiple trusted nodes can join to improve the accuracy of detection. We then show that although the detection mechanism will falsely identify groups of nodes traveling together as a Sybil attacker, we can extend the protocol to monitor collisions at the MAC level to differentiate between a single attacker spoofing many addresses and a group of nodes traveling in close proximity.

2021 ◽  
pp. 145-153
Author(s):  
Kanika Chauhan ◽  
Kalpana Yadav ◽  
Ankita Singh

Repositor ◽  
2020 ◽  
Vol 2 (8) ◽  
Author(s):  
Hawwin Purnama Akbar ◽  
Diah Risqiwati ◽  
Diah Risqiwati

Perkembangan ilmu pengetahuan pada bidang teknologi jaringan terjadi sangat cepat karena mengikuti perkembangan kebutuhan manusia. Salah satu teknologi jaringan yang saat ini menarik perhatian masyarakat adalah teknologi Wireless Sensor Network(WSN). WSN adalah jaringan dari kumpulan sensor yang terhubung menggunakan teknologi wireless secara ad-hoc dan setiap sensor node digunakan untuk proses pengumpulan data dan menghubungkan dengan node yang lain melalui jaringan wireless.Karena pada kebanyakan kasus aplikasi WSN digunakan pada lingkungan yang ekstrem dan sensor node harus dapat beroperasi secara otomatis tanpa campur tangan manusia, jaringan ini menjadi rentan akan beberapa ancaman jaringan dan dapat mempengaruhi performa dari jaringannya. Terdapat berbagai macam jenis serangan yang dapat membahayakan jaringan wireless sensor network diantaranya yang paling umum adalah sybil attack dan hello flood attack.            Dalam penelitian ini, penulis meneliti performa WSN saat diserang oleh Sybil attack dan hello flood attack dengan cara mengukur throughput, PDR(packet delivery ratio), jitter dan delay dalam jaringan WSN. Penelitian ini juga menganalisa jumlah node yang bervariasi dari 10 node sampai 30 node dengan waktu simulasi dari 10 detik sampai 30 detik lalu dianalisa jaringan ketika jaringan normal dan diserang oleh node penyerang yang bervariasi dari 1 sampai 3 penyerang. Dengan melakukan analisa tersebut, diperoleh data berupa perbandingan dampak serangan dari Sybil attack dan hello flood attack. Dampak dari sybil attack lebih berpengaruh pada parameter throughput dan pdr yang mengalami penurunan nilai hingga 69,9% untuk pdr dan 56,4% untuk throughput. Sedangkan dampak dari hello flood attack lebih berpengaruh pada parameter delay dan jitter yang mengalami kenaikandari nilai semula 0,05 detik menjadi 0,576 detikuntuk delay dan 0,579 detik untuk jitter.AbstractThe development of science in the field of network technology occurs very quickly because it follows the development of human needs. One of the network technology that is currently attracting public attention is wireless sensor network technology (WSN). WSN is a network of connected sensors using ad-hoc wireless technology and each node sensor are used to process data collection and connect with other nodes over a wireless network. Because in most cases WSN applications are used in extreme environments and node sensors must operate automatically without human intervention, these networks become vulnerable to some network threats and may affect the performance of their networks. There are various types of attacks that can harm wireless sensor network network among the most common is sybil attack and hello flood attack.             In this study, authors examined the performance of WSN when attacked by Sybil attack and hello flood attack by measuring throughput, PDR (packet delivery ratio), jitter and delay in WSN network. This study also analyzed the number of nodes that varied from 10 nodes to 30 nodes with simulated time from 10 seconds to 30 seconds and then analyzed the network when the network was normal and attacked by the attacking nodes that varied from 1 to 3 attackers. By doing the analysis, the datacan be obtained in the form of comparison of the impact of attacks from Sybil attack and hello flood attack. The impact of the sybil attack is more influential on the parameters of throughput and pdr which has decreased the maximum value up to 69.9% for pdr and 56.4% for throughput. While the impact of hello flood attack ismore influential on the delay and jitter parameters that increased from the original value of 0.05 seconds to 0.576 seconds for delay and 0.579 seconds for jitter. 


2018 ◽  
Vol 7 (2.8) ◽  
pp. 261
Author(s):  
Prateek Singhal ◽  
Puneet Sharma ◽  
Deepak Arora

In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any devices. Sybil attack is the detrimental attack against sensor network where several counterfeit identities and legitimate identities are used to get prohibited pass in a network. This is major attack which results an information loss and misinterpretation in the network, and it also minimizes the routing disturbance, trustworthiness and dropping sensitivity packets into a network. In this instance node can trust the imaginary node and sharing of information starts, owed to this security of node is get affected and information is lost. In this paper, a survey of CONTIKI OS-2.7, stimulation tool COOJA and the Sybil attack and proposed the defense mechanisms and CAM (Compare and Match) approach to verify the Sybil attack position and prevent it. This Sybil attack can be stimulated on the stimulation tool COOJA which helps to identify the attacker position node, whereas these attacks outcome in uni-casting as well as multicasting and in this paper specifically given the secure security for Wireless sensor network.


A Wireless Sensor Network (WSN) is a component with sensor nodes that continuously observes environmental circumstances. Sensor nodes accomplish different key operations like sensing temperature and distance. It has been used in many applications like computing, signal processing, and network selfconfiguration to expand network coverage and build up its scalability. The Unit of all these sensors that exhibit sensing and transmitting information will offer more information than those offered by autonomously operating sensors. Usually, the transmitting task is somewhat critical as there is a huge amount of data and sensors devices are restricted. Being the limited number of sensor devices the network is exposed to different types of attacks. The Traditional security mechanisms are not suitable for WSN as they are generally heavy and having limited number of nodes and also these mechanisms will not eliminate the risk of other attacks. WSN are most useful in different crucial domains such as health care, environment, industry, and security, military. For example, in a military operation, a wireless sensor network monitors various activities. If an event is detected, these sensor nodes sense that and report the data to the primary (base) station (called sink) by making communication with other nodes. To collect data from WSN base Stations are commonly used. Base stations have more resources (e.g. computation power and energy) compared to normal sensor nodes which include more or less such limitations. Aggregation points will gather the data from neighboring sensor nodes to combine the data and forward to master (base) stations, where the data will be further forwarded or processed to a processing center. In this manner, the energy can be preserved in WSN and the lifetime of network is expanded.


Sign in / Sign up

Export Citation Format

Share Document