Skip to main content

An Enhanced RSSI-Based Detection Scheme for Sybil Attack in Wireless Sensor Networks

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 69))

Included in the following conference series:

Abstract

In Sybil attack, a single faulty entity illegitimately claims multiple identities to gather more packets, which is extremely detrimental to network performance. This paper proposes an enhanced RSSI-based detection scheme with an innovative detection framework, including suspicious node screening phase and Sybil node verification phase. Introducing reputation module and adaptive threshold, malicious nodes are figured and marked by monitoring node promptly, which is essential to guarantee the reliability of detection nodes. In the collaborative work, monitoring node screens out the suspicious Sybil nodes firstly, and then selects two high reputation nodes for every suspicious node as detection nodes to carry out the verification of Sybil nodes. Theoretical analysis and simulation results show that our scheme achieves fast locating ability and high detection accuracy with low energy consumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou, H., Wu, Y., Feng, L., Liu, D.: A Security mechanism for cluster-based WSN against selective forwarding. Sensors 16(9), 1537–1553 (2016)

    Article  Google Scholar 

  2. Wu, Y.M.: An energy-balanced loop-free routing protocol for distributed wireless sensor networks. Int. J. Sens. Netw. 23(1), 123–131 (2017)

    Google Scholar 

  3. Kuo, F.S., Wei, T.W., Wen, C.C.: Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput. Netw. 53(18), 3042–3056 (2009)

    Article  Google Scholar 

  4. Sarigiannidis, P., Karapistoli, E., Economides, A.A.: Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Syst. Appl. 42(21), 7560–7572 (2015)

    Article  Google Scholar 

  5. Murat, D., Youngwhan, S.: An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: WoWMoM 2006, Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 564–570. Institute of Electrical and Electronics Engineering Computer Society, Buffalo-Niagara Falls (2006)

    Google Scholar 

  6. Lv, S.H., Wang, X.D., Zhou, X., Zhou, X.M.: Detecting the Sybil attack cooperatively in wireless sensor networks. In: Proceedings of the 2008 International Conference on Computational Intelligence and Security, CIS 2008, pp. 442–446. IEEE Computer Society, Suzhou (2008)

    Google Scholar 

  7. Liu, R.X., Wang, Y.L.: A new Sybil attack detection for wireless body sensor network. In: Proceedings of the 2014 10th International Conference on Computational Intelligence and Security, CIS 2014, pp. 367–370. Institute of Electrical and Electronics Engineers Inc., Kunming (2014)

    Google Scholar 

  8. Maarlan, S., Mircea, P.: Sybil attack type detection in wireless sensor networks based on received signal strength indicator detection scheme. In: SACI 2015, Proceedings of the 10th Jubilee IEEE International Symposium on Applied Computational Intelligence and Informatics, pp. 121–124. Institute of Electrical and Electronics Engineers Inc., Timisoara (2015)

    Google Scholar 

  9. Jan, M.A., Nanda, P., He, X.J., Liu, R.P.: A Sybil attack detection scheme for a centralized clustering-based hierarchical network. In: Proceedings of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015, pp. 318–325. Institute of Electrical and Electronics Engineers Inc., Helsinki (2015)

    Google Scholar 

  10. Yuan, Y.L., Huo, L.W., Wang, Z.X., Hongefe, D.: Secure APIT localization scheme against Sybil attacks in distributed wireless sensor networks. IEEE Access 6, 27629–27636 (2018)

    Article  Google Scholar 

  11. Yu, Y.L., Li, K.Q., Zhou, W.L.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)

    Article  Google Scholar 

  12. Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, pp. 1–17 (2002)

    Google Scholar 

  13. Hu, Y., Wu, Y.M., Wang, H.S.: Detection of insider selective forwarding attack based on monitor node and trust mechanism in WSN. Wirel. Sens. Netw. 6, 237–248 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuanming Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Y., Wu, Y. (2020). An Enhanced RSSI-Based Detection Scheme for Sybil Attack in Wireless Sensor Networks. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 69. Springer, Cham. https://doi.org/10.1007/978-3-030-12388-8_7

Download citation

Publish with us

Policies and ethics