An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks

被引:0
|
作者
Triki, Bayrem [1 ]
Rekhis, Slim [2 ]
Boudriga, Noureddine [2 ]
机构
[1] Univ Sousse, Sousse, Tunisia
[2] Univ Carthage, Carthage, Spain
关键词
MWSNs; Sybil detection; Radio Frequency Identification; Privacy preservation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a system for the prevention and the detection of Sybil attacks in Military Wireless Sensor networks (MWSNs). The identification of Sybil attacker is based on two types of authentication techniques. The first is based on the use of RFID tags embedded in Soldiers to authenticate them and get certificates. The second is based on the use of those certificates by soldiers to authenticate them to their neighbors. The solution prevents Sybil attacks by identifying soldiers that are using two valid certificates at the same time. The heartbeat of the soldier is used to enforce the authentication of soldiers and the privacy of soldiers is preserved where the team leaders of soldiers are the only entities that are able to detect the Sybil attack know about the real identity of each soldier.
引用
收藏
页数:2
相关论文
共 50 条
  • [31] A Security Localization Algorithm Based on DV-Hop Against Sybil Attack in Wireless Sensor Networks
    Shi Dong
    Xin-gang Zhang
    Wen-gang Zhou
    Journal of Electrical Engineering & Technology, 2020, 15 : 919 - 926
  • [32] The Sybil attack in sensor networks: Analysis & defenses
    Newsome, J
    Shi, E
    Song, D
    Perrig, A
    IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2004, : 259 - 268
  • [33] Detection of Sinkhole Attack in Wireless Sensor Networks
    Salehi, Ahmad S.
    Razzaque, M. A.
    Naraei, Parisa
    Farrokhtala, Ali
    2013 IEEE INTERNATIONAL CONFERENCE ON SPACE SCIENCE AND COMMUNICATION (ICONSPACE), 2013, : 361 - 365
  • [34] Detection of Wormhole Attack in Wireless Sensor Networks
    Yadav, Jyoti
    Kumar, Mukesh
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 : 243 - 250
  • [35] Wormhole Attack Detection in Wireless Sensor Networks
    Bendjima, Mostefa
    Feham, Mohammed
    PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 1319 - 1326
  • [36] Sybil Attack Detection Based on Signal Clustering in Vehicular Networks
    Tulay, Halit Bugra
    Emre Koksal, Can
    IEEE Transactions on Machine Learning in Communications and Networking, 2024, 2 : 753 - 765
  • [37] Sybil attack detection in a hierarchical sensor network
    Yin, Jian
    Madria, Sanjay Kumar
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 494 - 503
  • [38] Location verification based defense against sybil attack in sensor networks
    Mukhopadhyay, Debapriyay
    Saha, Indranil
    DISTRIBUTED COMPUTING AND NETWORKING, PROCEEDINGS, 2006, 4308 : 509 - 521
  • [39] Sinkhole attack detection based on redundancy mechanism in wireless sensor networks
    Zhang, Fang-Jiao
    Zhai, Li-Dong
    Yang, Jin-Cui
    Cui, Xiang
    2ND INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, ITQM 2014, 2014, 31 : 711 - 720
  • [40] A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It
    Mojtaba Jamshidi
    Ehsan Zangeneh
    Mehdi Esnaashari
    Aso Mohammad Darwesh
    Mohammad Reza Meybodi
    Wireless Personal Communications, 2019, 105 : 145 - 173