As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95% when the network was not very sparse.
All Science Journal Classification (ASJC) codes
- Information Systems
- Computer Networks and Communications