Fuzzy based Sybil attack detection in Wireless Sensor Network

2017 ◽  
Vol 5 (11) ◽  
pp. 50-56
Author(s):  
Palak . ◽  
2020 ◽  
Vol 309 ◽  
pp. 02005
Author(s):  
Hui Wang

Industrial wireless sensor network is a new application of wireless sensor network in the field of industry in recent years. However, IWSN may be subject to different attacks and security risks, among which the Sybil attack is the most harmful type of base attack. According to the characteristics of wireless sensor networks in industrial environment, a new three-tier detection scheme is proposed. In the first-level, all common nodes and Sybil nodes were detected by RSSI-based quadratic difference method. In the second layer, the residual energy-based method is used to continue the detection of the nodes that have been detected in the first-level. The detection of first and second-level high-energy nodes is finally completed by the base station. The simulation results show that our proposed scheme significantly improves network lifetime and effectively improve the detection rate of Sybil nodes.


2018 ◽  
Vol 7 (2.8) ◽  
pp. 261
Author(s):  
Prateek Singhal ◽  
Puneet Sharma ◽  
Deepak Arora

In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any devices. Sybil attack is the detrimental attack against sensor network where several counterfeit identities and legitimate identities are used to get prohibited pass in a network. This is major attack which results an information loss and misinterpretation in the network, and it also minimizes the routing disturbance, trustworthiness and dropping sensitivity packets into a network. In this instance node can trust the imaginary node and sharing of information starts, owed to this security of node is get affected and information is lost. In this paper, a survey of CONTIKI OS-2.7, stimulation tool COOJA and the Sybil attack and proposed the defense mechanisms and CAM (Compare and Match) approach to verify the Sybil attack position and prevent it. This Sybil attack can be stimulated on the stimulation tool COOJA which helps to identify the attacker position node, whereas these attacks outcome in uni-casting as well as multicasting and in this paper specifically given the secure security for Wireless sensor network.


Sign in / Sign up

Export Citation Format

Share Document