Detecting and confining Sybil attack in wireless sensor networks based on reputation systems coupled with self-organizing maps

6Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The Sybil attack is one of the most aggressive and evasive attacks in sensor networks that can affect on many aspects of network functioning. Thus, its efficient detection is of highest importance. In order to resolve this issue, in this work we propose to couple reputation systems with agents based on self-organizing map algorithm trained for detecting outliers in data. The response of the system consists in assigning low reputation values to the compromised node rendering them isolated from the rest of the network. The main improvement of this work consists in the way of calculating reputation, which is more flexible and discriminative in distinguishing attacks from normal behavior. Self-organizing map algorithm deploys feature space based on sequences of sensor outputs. Our solution offers many benefits: scalable solution, fast response to adversarial activities, ability to detect unknown attacks, high adaptability and low consumption. The testing results demonstrate its high ability in detecting and confining Sybil attack. © 2010 IFIP.

Cite

CITATION STYLE

APA

Banković, Z., Fraga, D., Moya, J. M., Vallejo, J. C., Araujo, Á., Malagón, P., … Blesa, J. (2010). Detecting and confining Sybil attack in wireless sensor networks based on reputation systems coupled with self-organizing maps. In IFIP Advances in Information and Communication Technology (Vol. 339 AICT, pp. 311–318). https://doi.org/10.1007/978-3-642-16239-8_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free