A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network

被引:0
|
作者
Jan, Mian Ahmad [1 ]
Nanda, Priyadarsi [1 ]
He, Xiangjian [1 ]
Liu, Ren Ping [2 ]
机构
[1] Univ Technol Sydney, Sch Comp & Commun, Sydney, NSW, Australia
[2] CSIRO, Wireless & Networking Lab, Sydney, NSW, Australia
关键词
Wireless Sensor Network; Sybil Attack; Base Station; Cluster; Cluster Head; WIRELESS SENSOR NETWORKS; MECHANISMS; PROTOCOLS;
D O I
10.1109/Trustcom-2015.390
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Wireless Sensor Networks (WSNs) have experienced phenomenal growth over the past decade. They are typically deployed in remote and hostile environments for monitoring applications and data collection. Miniature sensor nodes collaborate with each other to provide information on an unprecedented temporal and spatial scale. The resource- constrained nature of sensor nodes along with human- inaccessible terrains poses various security challenges to these networks at different layers. In this paper, we propose a novel detection scheme for Sybil attack in a centralized clustering- based hierarchical network. Sybil nodes are detected prior to cluster formation to prevent their forged identities from participating in cluster head selection. Only legitimate nodes are elected as cluster heads to enhance utilization of the resources. The proposed scheme requires collaboration of any two high energy nodes to analyze received signal strengths of neighbouring nodes. The simulation results show that our proposed scheme significantly improves network lifetime in comparison with existing clustering- based hierarchical routing protocols.
引用
收藏
页码:318 / 325
页数:8
相关论文
共 50 条
  • [41] CBFS: A Clustering-Based Feature Selection Mechanism for Network Anomaly Detection
    Mao, Jiewen
    Hu, Yongquan
    Jiang, Dong
    Wei, Tongquan
    Shen, Fuke
    IEEE ACCESS, 2020, 8 : 116216 - 116225
  • [42] Sybil Attack Type Detection in Wireless Sensor Networks based on Received Signal Strength Indicator detection scheme
    Marian, Salavat
    Mircea, Popa
    2015 IEEE 10TH JUBILEE INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2015, : 121 - 124
  • [43] Network traffic analysis over clustering-based collective anomaly detection
    Wang, Chonghua
    Zhou, Hao
    Hao, Zhiqiang
    Hu, Shu
    Li, Jun
    Zhang, Xueying
    Jiang, Bo
    Chen, Xuehong
    COMPUTER NETWORKS, 2022, 205
  • [44] Vehicle Driving Pattern Based Sybil Attack Detection
    Gu, Pengwenlong
    Khatoun, Rida
    Begriche, Youcef
    Serhrouchni, Ahmed
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1282 - 1288
  • [45] An efficient clustering scheme through estimate in centralized hierarchical routing protocol
    Kim, Jin-Mook
    Joo, Hyeon-Kyu
    Hong, Seong-Sik
    Ahn, Woo-Hyun
    Ryou, Hwang-Bin
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 145 - 152
  • [46] An Effective Privacy-Aware Sybil Attack Detection Scheme for Secure Communication in Vehicular Ad Hoc Network
    Parham, Mahdiyeh
    Pouyan, Ali A.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (02) : 1149 - 1182
  • [47] Hierarchical agglomerative clustering-based skin lesion detection with region based neural networks classification
    Ramprasad M.V.S.
    Nagesh S.S.V.
    Sahith V.
    Lankalapalli R.K.
    Measurement: Sensors, 2023, 29
  • [48] Clustering-Based Outlier Detection Method
    Jiang, Sheng-yi
    An, Qing-bo
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2008, : 429 - 433
  • [49] Clustering-Based Trajectory Outlier Detection
    Eldawy, Eman O.
    Mokhtar, Hoda M. O.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (05) : 133 - 139
  • [50] An Effective Privacy-Aware Sybil Attack Detection Scheme for Secure Communication in Vehicular Ad Hoc Network
    Mahdiyeh Parham
    Ali A. Pouyan
    Wireless Personal Communications, 2020, 113 : 1149 - 1182