Skip to main content
Top
Published in: Wireless Networks 4/2022

06-01-2022 | Original Paper

Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks

Authors: Reham Almesaeed, Eman Al-Salem

Published in: Wireless Networks | Issue 4/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The detection of sybil attack is one of the main security challenges in wireless sensor networks (WSNs). The attack is considered as one of the risky threats since an attacker can generate multiple fake identities with false messages to severely impair the normal operation of WSNs. This study proposes a novel sybil attack detection method referred to as CPPR, based on the wireless channel profile and the regulation of transmission power at the sensor nodes. The proposed CPPR mechanism can benefit from the advances in the physical layer at the sensor nodes to regulate their transmission power to prevent many attacks and maintain high detection ratio. The CPPR can also provide low operational overhead and energy consumption. The proposed scheme is shown to provide an average of 95% detection ratio despite the number of sybil nodes in the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Manrique JA, Rueda-Rueda JS (2016) Contrasting internet of things and wireless sensor network from a conceptual overview. In: 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData) Manrique JA, Rueda-Rueda JS (2016) Contrasting internet of things and wireless sensor network from a conceptual overview. In: 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData)
2.
go back to reference Riaza, M. N., Burirob, A., & Mahbob, A. (2018). Classification of attacks on wireless sensor networks: a survey. I J Wireless Microwave Technol, 8, 15–39.CrossRef Riaza, M. N., Burirob, A., & Mahbob, A. (2018). Classification of attacks on wireless sensor networks: a survey. I J Wireless Microwave Technol, 8, 15–39.CrossRef
3.
go back to reference Cetinkaya O, Akan OB (2016) Use of wireless sensor networks in smart homes. Emerg Commun Technol Wireless Sens Networks 233–258 Cetinkaya O, Akan OB (2016) Use of wireless sensor networks in smart homes. Emerg Commun Technol Wireless Sens Networks 233–258
4.
go back to reference Sharma, P. (2015). Overview of security mechanisms and attacks in wireless sensor networks. Int J Sci Res (IJSR), 6(1), 173–176. Sharma, P. (2015). Overview of security mechanisms and attacks in wireless sensor networks. Int J Sci Res (IJSR), 6(1), 173–176.
5.
go back to reference Rahbari, M., & Jamali, M. (2011). Efficient detection of sybil attack based on cryptoghraphy in VANET. Int J Netw Security Appl (IJNSA), 3(6), 185–195. Rahbari, M., & Jamali, M. (2011). Efficient detection of sybil attack based on cryptoghraphy in VANET. Int J Netw Security Appl (IJNSA), 3(6), 185–195.
6.
go back to reference Chaudhari, H. C., & Kadam, L. U. (2011). Wireless sensor networks: security, attacks and challenges. Int J Netw, 1(1), 4–16. Chaudhari, H. C., & Kadam, L. U. (2011). Wireless sensor networks: security, attacks and challenges. Int J Netw, 1(1), 4–16.
7.
go back to reference Gavric, Z., & Simic, D. (2018). Overview of Dos attacks on wireless sensor networks and experimental results for simulation of interference attacks. Ing Investig, 38, 130–138. Gavric, Z., & Simic, D. (2018). Overview of Dos attacks on wireless sensor networks and experimental results for simulation of interference attacks. Ing Investig, 38, 130–138.
8.
go back to reference Butun, I., Osterberg, P., & Song, H. (2019). Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor, 22, 616–644.CrossRef Butun, I., Osterberg, P., & Song, H. (2019). Security of the internet of things: vulnerabilities, attacks, and countermeasures. IEEE Commun Surv Tutor, 22, 616–644.CrossRef
9.
go back to reference Soni K, Mishra P (2014) Various security attacks in wireless sensor network: a survey. Int J Eng Res Technol (IJERT) 3(4) Soni K, Mishra P (2014) Various security attacks in wireless sensor network: a survey. Int J Eng Res Technol (IJERT) 3(4)
10.
go back to reference Sharma K, Ghose MK (2010) Wireless sensor networks: An overview on its security threats. IJCA Special Issue Mobile Ad Hoc Netw 42–45 Sharma K, Ghose MK (2010) Wireless sensor networks: An overview on its security threats. IJCA Special Issue Mobile Ad Hoc Netw 42–45
11.
go back to reference Palak, P. (2017). Review on the various sybil attack detection techniques in wireless sensor network. Int J Comput Appl, 164, 40–45. Palak, P. (2017). Review on the various sybil attack detection techniques in wireless sensor network. Int J Comput Appl, 164, 40–45.
12.
go back to reference Amuthavalli, R., & Bhuvaneswaran, R. (2014). Detection and prevention of sybil attack in wireless sensor networks employing random password comparison method. J Theor Appl Inf Technol, 67(1), 236–246. Amuthavalli, R., & Bhuvaneswaran, R. (2014). Detection and prevention of sybil attack in wireless sensor networks employing random password comparison method. J Theor Appl Inf Technol, 67(1), 236–246.
13.
go back to reference Gharu, V., Pawar, M., & Agarwal, J. (2017). A literature survey on security issues of WSN and different types of attacks in network. Indian J Comput Sci Eng (IJCSE), 8(2), 80–83. Gharu, V., Pawar, M., & Agarwal, J. (2017). A literature survey on security issues of WSN and different types of attacks in network. Indian J Comput Sci Eng (IJCSE), 8(2), 80–83.
14.
go back to reference Singh, R., Singh, J., & Singh, R. (2017). A novel sybil attack detection technique for wireless sensor networks. Adv Comput Sci Technol, 10(2), 185–202. Singh, R., Singh, J., & Singh, R. (2017). A novel sybil attack detection technique for wireless sensor networks. Adv Comput Sci Technol, 10(2), 185–202.
15.
go back to reference AlOmirah AA Detecting sybil attack in mobile wireless sensor networks using observer nodes AlOmirah AA Detecting sybil attack in mobile wireless sensor networks using observer nodes
16.
go back to reference Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE international workshop on sensor network protocols and applications Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE international workshop on sensor network protocols and applications
17.
go back to reference Shi, W., Liu, S., & Zhang, Z. (2015). A lightweight detection mechanism against sybil attack in wireless sensor network. KSII Trans Internet Inf Syst, 9(9), 3738–3750. Shi, W., Liu, S., & Zhang, Z. (2015). A lightweight detection mechanism against sybil attack in wireless sensor network. KSII Trans Internet Inf Syst, 9(9), 3738–3750.
18.
go back to reference Dhamodharan, U. S., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci World J, 2015, 1–7.CrossRef Dhamodharan, U. S., & Vayanaperumal, R. (2015). Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci World J, 2015, 1–7.CrossRef
19.
go back to reference Tangpong A (2010) Managing sybil identities in distributed systems Tangpong A (2010) Managing sybil identities in distributed systems
20.
go back to reference M. Wen, H. Li, Y.-f. Zheng and K.-f. Chen, “TDOA-based Sybil Attack Detection Scheme for wireless Sensor Networks,” Journal of Shanghai University (English Edition), pp. 66–70, 2008. M. Wen, H. Li, Y.-f. Zheng and K.-f. Chen, “TDOA-based Sybil Attack Detection Scheme for wireless Sensor Networks,” Journal of Shanghai University (English Edition), pp. 66–70, 2008.
21.
go back to reference Saxena, S., & Sejwar, V. (2014). Sybil attack detection and analysis of energy consumption in cluster based sensor networks. Int J Grid Distrib Comput, 7(5), 15–30.CrossRef Saxena, S., & Sejwar, V. (2014). Sybil attack detection and analysis of energy consumption in cluster based sensor networks. Int J Grid Distrib Comput, 7(5), 15–30.CrossRef
22.
go back to reference Wang H (2019) A three-tier scheme for sybil attack detection in heterogeneous IWSN. In: 2019 international conference on computer science communication and network security (CSCNS2019) Wang H (2019) A three-tier scheme for sybil attack detection in heterogeneous IWSN. In: 2019 international conference on computer science communication and network security (CSCNS2019)
23.
go back to reference Demirbas M, Song Y (2006) An RSSI-based scheme for sybil attack detection in wireless sensor networks Demirbas M, Song Y (2006) An RSSI-based scheme for sybil attack detection in wireless sensor networks
24.
go back to reference Jan MA, Nanda P, He X, Liu RP (2015) A sybil attack detection scheme for a centralized clustering-based hierarchical network. In: The 14th IEEE international conference on trust, security and privacy in computing and communications (IEEE TrustCom-15). Helsinki, Finland Jan MA, Nanda P, He X, Liu RP (2015) A sybil attack detection scheme for a centralized clustering-based hierarchical network. In: The 14th IEEE international conference on trust, security and privacy in computing and communications (IEEE TrustCom-15). Helsinki, Finland
25.
go back to reference Liu Y, Wu Y (2020) An enhanced RSSI-based detection scheme for sybil attack in wireless sensor networks. In: Future of information and communication conference. San Francisco, United States Liu Y, Wu Y (2020) An enhanced RSSI-based detection scheme for sybil attack in wireless sensor networks. In: Future of information and communication conference. San Francisco, United States
26.
go back to reference Li M, Xiong Y, Wu X, Zhou X, Sun Y, Chen S, Zhu X (2013) A regional statistics detection scheme against sybil attacks in WSNs. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications. Melbourne, Australia Li M, Xiong Y, Wu X, Zhou X, Sun Y, Chen S, Zhu X (2013) A regional statistics detection scheme against sybil attacks in WSNs. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communications. Melbourne, Australia
27.
go back to reference Misra S, Myneni S (2010) On identifying power control performing sybil nodes in wireless sensor networks using RSSI. In: Global telecommunications conference (GLOBECOM 2010). Miami, FL, USA Misra S, Myneni S (2010) On identifying power control performing sybil nodes in wireless sensor networks using RSSI. In: Global telecommunications conference (GLOBECOM 2010). Miami, FL, USA
28.
go back to reference Wang H (2020) A three-tier scheme for sybil attack detection in heterogeneous IWSN. In: 2019 international conference on computer science communication and network security (CSCNS2019) Wang H (2020) A three-tier scheme for sybil attack detection in heterogeneous IWSN. In: 2019 international conference on computer science communication and network security (CSCNS2019)
29.
go back to reference Wang H, Zhang H-F (2020) A sybil attack detection scheme for a coal mines fire monitory application. In: 2020 international conference on computer ngineering and Aapplication (ICCEA). Ordos, China Wang H, Zhang H-F (2020) A sybil attack detection scheme for a coal mines fire monitory application. In: 2020 international conference on computer ngineering and Aapplication (ICCEA). Ordos, China
30.
go back to reference Singh, S., & Saini, H. S. (2021). PCTBC: power control tree-based cluster approach for sybil attack in wireless sensor networks. J Circuits Syst Comput, 30(7), 2150129.MathSciNetCrossRef Singh, S., & Saini, H. S. (2021). PCTBC: power control tree-based cluster approach for sybil attack in wireless sensor networks. J Circuits Syst Comput, 30(7), 2150129.MathSciNetCrossRef
31.
go back to reference Heinzelman WR, Chandrakasan A, Balakrishnan H (2000:) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd annual Hawaii international conference on system sciences Heinzelman WR, Chandrakasan A, Balakrishnan H (2000:) Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd annual Hawaii international conference on system sciences
32.
go back to reference Amgoth, T., & Jana, P. K. (2015). Energy-aware routing algorithm for wireless sensor networks. Comput Electr Eng, 41, 357–367.CrossRef Amgoth, T., & Jana, P. K. (2015). Energy-aware routing algorithm for wireless sensor networks. Comput Electr Eng, 41, 357–367.CrossRef
33.
go back to reference Bendjeddou A, Laoufi H, Boudjit S (2018) LEACH-S: low energy adaptive clustering hierarchy for sensor network. In: 2018 international symposium on networks, computers and communications (ISNCC), Rome Bendjeddou A, Laoufi H, Boudjit S (2018) LEACH-S: low energy adaptive clustering hierarchy for sensor network. In: 2018 international symposium on networks, computers and communications (ISNCC), Rome
Metadata
Title
Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
Authors
Reham Almesaeed
Eman Al-Salem
Publication date
06-01-2022
Publisher
Springer US
Published in
Wireless Networks / Issue 4/2022
Print ISSN: 1022-0038
Electronic ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-021-02871-0

Other articles of this Issue 4/2022

Wireless Networks 4/2022 Go to the issue