Defending Sybil attacks based on neighboring relations in wireless sensor networks

Wei Tong Wang, Kuo-Feng Ssu, Wen Chung Chang

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95% when the network was not very sparse.

Original languageEnglish
Pages (from-to)408-420
Number of pages13
JournalSecurity and Communication Networks
Volume3
Issue number5
DOIs
Publication statusPublished - 2010 Jan 1

Fingerprint

Network security
Authentication
Cryptography
Wireless sensor networks
Network protocols

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Cite this

@article{967141237723441aa19eed04bfb1b968,
title = "Defending Sybil attacks based on neighboring relations in wireless sensor networks",
abstract = "As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95{\%} when the network was not very sparse.",
author = "Wang, {Wei Tong} and Kuo-Feng Ssu and Chang, {Wen Chung}",
year = "2010",
month = "1",
day = "1",
doi = "10.1002/sec.197",
language = "English",
volume = "3",
pages = "408--420",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",
number = "5",

}

Defending Sybil attacks based on neighboring relations in wireless sensor networks. / Wang, Wei Tong; Ssu, Kuo-Feng; Chang, Wen Chung.

In: Security and Communication Networks, Vol. 3, No. 5, 01.01.2010, p. 408-420.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Defending Sybil attacks based on neighboring relations in wireless sensor networks

AU - Wang, Wei Tong

AU - Ssu, Kuo-Feng

AU - Chang, Wen Chung

PY - 2010/1/1

Y1 - 2010/1/1

N2 - As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95% when the network was not very sparse.

AB - As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95% when the network was not very sparse.

UR - http://www.scopus.com/inward/record.url?scp=84877890856&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84877890856&partnerID=8YFLogxK

U2 - 10.1002/sec.197

DO - 10.1002/sec.197

M3 - Article

VL - 3

SP - 408

EP - 420

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 5

ER -