scholarly journals A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

2021 ◽  
Vol 7 ◽  
pp. e673
Author(s):  
Akashah Arshad ◽  
Zurina Mohd Hanapi ◽  
Shamala Subramaniam ◽  
Rohaya Latip

Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemented in the routing protocol. In a Sybil attack, an adversary illegally advertises several false identities or a single identity that may occur at several locations called Sybil nodes. Therefore, in this paper, we give a survey of the most up-to-date assured methods to defend from the Sybil attack. The Sybil attack countermeasures includes encryption, trust, received signal indicator (RSSI), encryption and artificial intelligence. Specifically, we survey different methods, along with their advantages and disadvantages, to mitigate the Sybil attack. We discussed the lesson learned and the future avenues of study and open issues in WSN security analysis.

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Wenting Li ◽  
Bin Li ◽  
Yiming Zhao ◽  
Ping Wang ◽  
Fushan Wei

Nowadays wireless sensor networks (WSNs) have drawn great attention from both industrial world and academic community. To facilitate real-time data access for external users from the sensor nodes directly, password-based authentication has become the prevalent authentication mechanism in the past decades. In this work, we investigate three foremost protocols in the area of password-based user authentication scheme for WSNs. Firstly, we analyze an efficient and anonymous protocol and demonstrate that though this protocol is equipped with a formal proof, it actually has several security loopholes been overlooked, such that it cannot resist against smart card loss attack and violate forward secrecy. Secondly, we scrutinize a lightweight protocol and point out that it cannot achieve the claimed security goal of forward secrecy, as well as suffering from user anonymity violation attack and offline password guessing attack. Thirdly, we find that an anonymous scheme fails to preserve two critical properties of forward secrecy and user friendliness. In addition, by adopting the “perfect forward secrecy (PFS)” principle, we provide several effective countermeasures to remedy the identified weaknesses. To test the necessity and effectiveness of our suggestions, we conduct a comparison of 10 representative schemes in terms of the underlying cryptographic primitives used for realizing forward secrecy.


Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4281
Author(s):  
Ngoc-Thanh Dinh ◽  
Younghan Kim

Wireless sensor network (WSN) studies have been carried out for multiple years. At this stage, many real WSNs have been deployed. Therefore, configuration and updating are critical issues. In this paper, we discuss the issues of configuring and updating a wireless sensor network (WSN). Due to a large number of sensor nodes, in addition to the limited resources of each node, manual configuring turns out to be impossible. Therefore, various auto-configuration approaches have been proposed to address the above challenges. In this survey, we present a comprehensive review of auto-configuration mechanisms with the taxonomy of classifications of the existing studies. For each category, we discuss and compare the advantages and disadvantages of related schemes. Lastly, future works are discussed for the remaining issues in this topic.


2017 ◽  
Vol 13 (11) ◽  
pp. 4 ◽  
Author(s):  
Marouane El Mabrouk ◽  
Salma Gaou

A wireless sensor network is a network that can design a self-organizing structure and provides effective support for several protocols such as routing, locating, discovering services, etc. It is composed of several nodes called sensors grouped together into a network to communicate with each other and with the base stations. Nowadays, the use of Wireless sensor networks increased considerably. It can collect physical data and transform it into a digital values in real-time to monitor in a continuous manner different disaster like flood. However, due to various factors that can affect the wireless sensor networks namely, environmental, manufacturing errors hardware and software problems etc... It is necessary to carefully select and filter the data from the wireless sensors since we are providing a decision support system for flood forecasting and warning. In this paper, we presents an intelligent Pre-Processing model of real-time flood forecasting and warning for data classification and aggregation. The proposed model consists on several stages to monitor the wireless sensors and its proper functioning, to provide the most appropriate data received from the wireless sensor networks in order to guarantee the best accuracy in terms of real-time data and to generate a historical data to be used in the further flood forecasting.


Sign in / Sign up

Export Citation Format

Share Document