A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network

被引:0
|
作者
Jan, Mian Ahmad [1 ]
Nanda, Priyadarsi [1 ]
He, Xiangjian [1 ]
Liu, Ren Ping [2 ]
机构
[1] Univ Technol Sydney, Sch Comp & Commun, Sydney, NSW, Australia
[2] CSIRO, Wireless & Networking Lab, Sydney, NSW, Australia
关键词
Wireless Sensor Network; Sybil Attack; Base Station; Cluster; Cluster Head; WIRELESS SENSOR NETWORKS; MECHANISMS; PROTOCOLS;
D O I
10.1109/Trustcom-2015.390
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSNs) have experienced phenomenal growth over the past decade. They are typically deployed in remote and hostile environments for monitoring applications and data collection. Miniature sensor nodes collaborate with each other to provide information on an unprecedented temporal and spatial scale. The resource- constrained nature of sensor nodes along with human- inaccessible terrains poses various security challenges to these networks at different layers. In this paper, we propose a novel detection scheme for Sybil attack in a centralized clustering- based hierarchical network. Sybil nodes are detected prior to cluster formation to prevent their forged identities from participating in cluster head selection. Only legitimate nodes are elected as cluster heads to enhance utilization of the resources. The proposed scheme requires collaboration of any two high energy nodes to analyze received signal strengths of neighbouring nodes. The simulation results show that our proposed scheme significantly improves network lifetime in comparison with existing clustering- based hierarchical routing protocols.
引用
收藏
页码:318 / 325
页数:8
相关论文
共 50 条
  • [31] Clustering-based hierarchical radiosity for dynamic environments
    Lee, WY
    Chuang, JH
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 1999, 15 (06) : 815 - 832
  • [32] Network anomalous attack detection based on clustering and classifier
    Yang, Hongyu
    Xie, Feng
    Lu, Yi
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 672 - +
  • [33] On hierarchical clustering-based approach for RDDBS design
    Abdalla, Hassan I.
    Amer, Ali A.
    Ravana, Sri Devi
    JOURNAL OF BIG DATA, 2023, 10 (01)
  • [34] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network
    Sharma, Aravendra Kumar
    Saroj, Sushil Kumar
    Chauhan, Sanjeev Kumar
    Saini, Sachin Kumar
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599
  • [35] Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
    Almesaeed, Reham
    Al-Salem, Eman
    WIRELESS NETWORKS, 2022, 28 (04) : 1361 - 1374
  • [36] A clustering-based approximation scheme for in-network aggregation over sensor networks
    Xie, Lei
    Chen, Lijun
    Chen, Daoxu
    Xie, Li
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2007, 4611 : 503 - +
  • [37] A New Sybil Attack Detection for Wireless Body Sensor Network
    Liu, Ruixia
    Wang, Yinglong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 367 - 370
  • [38] Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
    Reham Almesaeed
    Eman Al-Salem
    Wireless Networks, 2022, 28 : 1361 - 1374
  • [39] A Clustering-based Scheme for Labeling XML Trees
    Soltan, Sadegh
    Rahgozar, Masoud
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9A): : 84 - 89
  • [40] Clustering-based Feature Selection for Internet Attack Defense
    Seo, Jungtaek
    Kim, Jungtae
    Moon, Jongsub
    Kang, Boo Jung
    Im, Eul Gyu
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2008, 1 (01): : 91 - 98