An approach to mitigating Sybil attack in wireless networks using ZigBee

被引:0
|
作者
Lee, Gunhee [1 ]
Lim, Jaesung [1 ]
Kim, Dong-Kyoo [1 ]
Yang, SungHyun [2 ]
Yoon, MyungHyun [3 ]
机构
[1] Ajou Univ, Sch Informat & Commun, Suwon 443749, South Korea
[2] Kwangwoon Univ, Dept Elect Engn, Seoul, South Korea
[3] Korea Elect Technol Inst, Ubiquitous Comp Res Ctr, Seongnam 463816, South Korea
来源
10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES | 2008年
关键词
Sybil attack; ZigBee protocol suite; wireless sensor network; security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Various sensors employing ZigBee protocol send environment information to a home gateway. The home gateway manages every devices, sensors and services according to the information. However, if an attacker fabricates the information with malevolent purpose, the system may perform any inadvertent service, which may be harmful to users. Sybil attack is one of serious threats that uses such vulnerability. In this paper, we propose a Sybil attack detection method and its response method to mitigate the effect of the attack in wireless network using ZigBee. The proposed method employs a challenge-response approach. A verifier send a node a request that corresponds to an identity, and the receiver should respond the request properly within threshold time. The performance of the proposed method is reasonable for applying it to the practical networks. This will help the wireless networks using ZigBee to enhance its security.
引用
收藏
页码:1005 / +
页数:2
相关论文
共 50 条
  • [31] A Secure Positioning Algorithm against Sybil Attack in Wireless Sensor Networks Based on Number Allocating
    Tang, Qing
    Wang, Jian
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 932 - 936
  • [32] Information-theoretic approach for secure localization against sybil attack in wireless sensor network
    Arindam Giri
    Subrata Dutta
    Sarmistha Neogy
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 9491 - 9497
  • [33] Adaptive link fingerprint authentication scheme against Sybil attack in ZigBee network
    Yu B.
    Huang M.
    Huang Y.
    Kong Z.
    Huang, Meigen (huang_meigen@163.com), 2016, Science Press (38): : 2627 - 2632
  • [34] Information-theoretic approach for secure localization against sybil attack in wireless sensor network
    Giri, Arindam
    Dutta, Subrata
    Neogy, Sarmistha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (10) : 9491 - 9497
  • [35] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [36] Sybil Attack Resilient Traffic Networks: A Physics-Based Trust Propagation Approach
    Shoukry, Yasser
    Mishra, Shaunak
    Luo, Zutian
    Diggavi, Suhas
    2018 9TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2018), 2018, : 43 - 54
  • [37] DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS
    Vamsi, P. Raghu
    Kant, Krishna
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02): : 651 - 680
  • [38] Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis
    Yang, Jie
    Chen, Yingying
    Trappe, Wade
    2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2008, : 834 - +
  • [39] Commercial applications of wireless sensor networks using ZigBee
    Wheeler, Andrew
    IEEE COMMUNICATIONS MAGAZINE, 2007, 45 (04) : 70 - 77
  • [40] Mitigating SSDF attack using distance-based outlier approach in cognitive radio networks
    Singh, Wangjam Niranjan
    Marchang, Ningrinla
    Taggu, Amar
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2019, 32 (02) : 119 - 132