Detecting sybil attacks in wireless sensor networks using sequential analysis

9Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Wireless Sensor Networks (WSNs) suffer from many security attacks when deployed either in remote or hostile environments. Among possible attacks, the Sybil attack is one of the severe attacks in which malicious nodes report false identities and location information such that the remaining nodes believe that many nodes exist in their vicinity. The current study proposes a method for detecting Sybil attack using sequential analysis. This method works in two stages. First, it collects the evidences by observing neighboring node activities. Further, the collected evidences are consolidated to provide input to the second stage. In the second stage, collected evidences are validated using the sequential probability ratio test to decide whether the neighbor node is Sybil or benign. The proposed method has been evaluated using the network simulator ns-2. Simulation results show that the proposed method is robust in detecting Sybil attacks with very low false positive and false negative rates.

Cite

CITATION STYLE

APA

Vamsi, P. R., & Kant, K. (2016). Detecting sybil attacks in wireless sensor networks using sequential analysis. International Journal on Smart Sensing and Intelligent Systems, 9(2), 651–680. https://doi.org/10.21307/ijssis-2017-889

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free