Defending Sybil attacks based on neighboring relations in wireless sensor networks

Wei Tong Wang, Kuo Feng Ssu, Wen Chung Chang

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)


As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95% when the network was not very sparse.

Original languageEnglish
Pages (from-to)408-420
Number of pages13
JournalSecurity and Communication Networks
Issue number5
Publication statusPublished - 2010

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications


Dive into the research topics of 'Defending Sybil attacks based on neighboring relations in wireless sensor networks'. Together they form a unique fingerprint.

Cite this