Visible to the public Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks

TitleSybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Publication TypeConference Paper
Year of Publication2014
AuthorsVamsi, P.R., Kant, K.
Conference NameSignal Propagation and Computer Technology (ICSPCT), 2014 International Conference on
Date PublishedJuly
KeywordsAcoustics, actuators, Bandwidth, encryption methods, geographic routing, GPSR protocol, greedy perimeter stateless routing, IEEE 802.11 Standards, location information, malicious node, network theory (graphs), network traffic, Optimization, Robustness, Routing protocols, sequential hypothesis testing, statistical testing, Sybil attack, Sybil attack detection, telecommunication security, Wireless sensor networks
Abstract

Sybil attack poses a serious threat to geographic routing. In this attack, a malicious node attempts to broadcast incorrect location information, identity and secret key information. A Sybil node can tamper its neighboring nodes for the purpose of converting them as malicious. As the amount of Sybil nodes increase in the network, the network traffic will seriously affect and the data packets will never reach to their destinations. To address this problem, researchers have proposed several schemes to detect Sybil attacks. However, most of these schemes assume costly setup such as the use of relay nodes or use of expensive devices and expensive encryption methods to verify the location information. In this paper, the authors present a method to detect Sybil attacks using Sequential Hypothesis Testing. The proposed method has been examined using a Greedy Perimeter Stateless Routing (GPSR) protocol with analysis and simulation. The simulation results demonstrate that the proposed method is robust against detecting Sybil attacks.

URLhttp://ieeexplore.ieee.org/document/6884945/
DOI10.1109/ICSPCT.2014.6884945
Citation Key6884945