An RFID based System for the detection of Sybil attack in Military Wireless Sensor networks

被引:0
|
作者
Triki, Bayrem [1 ]
Rekhis, Slim [2 ]
Boudriga, Noureddine [2 ]
机构
[1] Univ Sousse, Sousse, Tunisia
[2] Univ Carthage, Carthage, Spain
关键词
MWSNs; Sybil detection; Radio Frequency Identification; Privacy preservation;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a system for the prevention and the detection of Sybil attacks in Military Wireless Sensor networks (MWSNs). The identification of Sybil attacker is based on two types of authentication techniques. The first is based on the use of RFID tags embedded in Soldiers to authenticate them and get certificates. The second is based on the use of those certificates by soldiers to authenticate them to their neighbors. The solution prevents Sybil attacks by identifying soldiers that are using two valid certificates at the same time. The heartbeat of the soldier is used to enforce the authentication of soldiers and the privacy of soldiers is preserved where the team leaders of soldiers are the only entities that are able to detect the Sybil attack know about the real identity of each soldier.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It
    Jamshidi, Mojtaba
    Zangeneh, Ehsan
    Esnaashari, Mehdi
    Darwesh, Aso Mohammad
    Meybodi, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (01) : 145 - 173
  • [42] Robust Sybil Attack Detection in Vehicular Networks
    Tulay, Halit Bugra
    Koksal, Can Emre
    2021 IEEE 94TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-FALL), 2021,
  • [43] A Novel Energy-Efficient Sybil Node Detection Algorithm for Intrusion Detection System in Wireless Sensor Networks
    Karuppiah, A. Babu
    Dalfiah, J.
    Yuvashri, K.
    Rajaram, S.
    Pathan, Al-Sakib Khan
    2014 3RD INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS 2014), 2014, : 95 - 98
  • [44] Channel-Based Detection of Sybil Attacks in Wireless Networks
    Xiao, Liang
    Greenstein, Larry J.
    Mandayam, Narayan B.
    Trappe, Wade
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (03) : 492 - 503
  • [45] Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    Rokhani, Fakhrul Z.
    COMPUTER COMMUNICATIONS, 2017, 110 : 75 - 82
  • [46] Secure localization with attack detection in wireless sensor networks
    Wen Tao Zhu
    Yang Xiang
    Jianying Zhou
    Robert H. Deng
    Feng Bao
    International Journal of Information Security, 2011, 10 : 155 - 171
  • [47] A wormhole attack detection algorithm in wireless sensor networks
    Dong, X.-M. (dongxiaomei@ise.neu.edu.cn), 1600, Northeast University (33):
  • [48] Detection & Prevention of Vampire Attack in Wireless Sensor Networks
    Sharma, Mayank Kumar
    Joshi, Brijendra Kumar
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [49] Detection of Node Capture Attack in Wireless Sensor Networks
    Agrawal, Sarita
    Das, Manik Lal
    Lopez, Javier
    IEEE SYSTEMS JOURNAL, 2019, 13 (01): : 238 - 247
  • [50] Secure localization with attack detection in wireless sensor networks
    Zhu, Wen Tao
    Xiang, Yang
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (03) : 155 - 171