Detecting Sybil Attacks in Wireless and Sensor Networks Using Cluster Analysis

被引:17
|
作者
Yang, Jie [1 ]
Chen, Yingying [1 ]
Trappe, Wade [2 ]
机构
[1] Stevens Inst Technol, Dept ECE, Hoboken, NJ 07030 USA
[2] Rutgers State Univ, WINLAB, Piscataway, NJ 08854 USA
关键词
D O I
10.1109/MAHSS.2008.4660139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless networks are vulnerable to sybil attacks, in which a sybil node forges multiple identifications to trick the system and conduct harmful attacks. The traditional approach to address sybil attacks is to employ cryptographic-related methods. However, conventional security approaches may not always desirable due to their infrastructural overhead. In this paper, we propose to utilize K-means cluster analysis for detecting sybil attacks based on the spatial correlation between the signal strength and physical locations. Our approach requires minimal overhead to wireless devices. We have evaluated our methods through experimentation using both an 802.11 (WiFi) network as well as an 802.15.4 (ZigBee) network in two office buildings. Our results show that the proposed sybil attack detector is highly effective with over 95% detection rates and under 5% false positive rates.
引用
收藏
页码:834 / +
页数:2
相关论文
共 50 条
  • [1] DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02): : 651 - 680
  • [2] Detecting and preventing Sybil attacks in wireless sensor networks
    Wadii, Jlassi
    Rim, Haddad
    Ridha, Bouallegue
    [J]. 2019 IEEE 19TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS 2019), 2019,
  • [3] Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
    Ssu, Kuo-Feng
    Wang, Wei-Tong
    Chang, Wen-Chung
    [J]. COMPUTER NETWORKS, 2009, 53 (18) : 3042 - 3056
  • [4] Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information
    Sarigiannidis, Panagiotis
    Karapistoli, Eirini
    Economides, Anastasios A.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) : 7560 - 7572
  • [5] Detecting Sybil Attacks in Mobile Wireless Sensor Networks Based on ID Frequency
    Cheng, Ying-ying
    Huang, He-jiao
    Du, Hong-wei
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 330 - 334
  • [6] Detecting Cluster Head Attacks in Heterogeneous Wireless Sensor Networks
    Jia, Chenlong
    Lim, Teng Joon
    [J]. 2017 IEEE 85TH VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2017,
  • [7] Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks
    Lv, Shaohe
    Wang, Xiaodong
    Zhao, Xin
    Zhou, Xingming
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 442 - 446
  • [8] Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    Rokhani, Fakhrul Z.
    [J]. COMPUTER COMMUNICATIONS, 2017, 110 : 75 - 82
  • [9] DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS
    Yao, Lan
    Zhao, Zhibin
    Yu, Ge
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (01) : 229 - 243
  • [10] Detecting wormhole attacks in wireless sensor networks
    Xu, Yurong
    Chen, Guanling
    Ford, James
    Makedon, Fillia
    [J]. CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 267 - +