An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks

被引:0
|
作者
Triki, Bayrem [1 ]
Rekhis, Slim [2 ]
Boudriga, Noureddine [2 ]
机构
[1] Univ Sousse, Sousse, Tunisia
[2] Univ Carthage, Carthage, Spain
关键词
MWSNs; Sybil detection; Radio Frequency Identification; Privacy preservation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a system for the prevention and the detection of Sybil attacks in Military Wireless Sensor networks (MWSNs). The identification of Sybil attacker is based on two types of authentication techniques. The first is based on the use of RFID tags embedded in Soldiers to authenticate them and get certificates. The second is based on the use of those certificates by soldiers to authenticate them to their neighbors. The solution prevents Sybil attacks by identifying soldiers that are using two valid certificates at the same time. The heartbeat of the soldier is used to enforce the authentication of soldiers and the privacy of soldiers is preserved where the team leaders of soldiers are the only entities that are able to detect the Sybil attack know about the real identity of each soldier.
引用
收藏
页数:2
相关论文
共 50 条
  • [21] Sybil Attack Detection and Analysis of Energy Consumption in Cluster Based Sensor Networks
    Saxena, Sweety
    Sejwar, Vikas
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 15 - 30
  • [22] An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks
    Cheng, Chunling
    Qian, Yaqiu
    Zhang, Dengyin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [23] A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network
    Shi, Wei
    Liu, Sanyang
    Zhang, Zhaohui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (09): : 3738 - 3750
  • [24] A Secure Positioning Algorithm against Sybil Attack in Wireless Sensor Networks Based on Number Allocating
    Tang, Qing
    Wang, Jian
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 932 - 936
  • [25] Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
    Singh, Surinder
    Saini, Hardeep Singh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 190 - 193
  • [26] A Novel Code Attestation Scheme Against Sybil Attack in Wireless Sensor Networks
    Makhdoom, Imran
    Afzal, Mehreen
    Rashid, Imran
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 1 - 6
  • [27] Method of Detecting the Sybil Attack Based on Ranging in Wireless Sensor Network
    Ren Xiu-li
    Yang Wei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4569 - 4572
  • [28] Code Attestation Based Intrusion Detection System for Compression Attack in Wireless Sensor Networks
    Surti, Neelam A.
    Jinwala, Devesh C.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (05): : 209 - 216
  • [29] PCTBC: Power Control Tree-Based Cluster Approach for Sybil Attack in Wireless Sensor Networks
    Singh, Surinder
    Saini, Hardeep Singh
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2021, 30 (07)
  • [30] A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks
    Dong, Shi
    Zhang, Xin-gang
    Zhou, Wen-gang
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2020, 15 (02) : 919 - 926