Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks
Title | Sybil attack detection using Sequential Hypothesis Testing in Wireless Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Vamsi, P.R., Kant, K. |
Conference Name | Signal Propagation and Computer Technology (ICSPCT), 2014 International Conference on |
Date Published | July |
Keywords | Acoustics, actuators, Bandwidth, encryption methods, geographic routing, GPSR protocol, greedy perimeter stateless routing, IEEE 802.11 Standards, location information, malicious node, network theory (graphs), network traffic, Optimization, Robustness, Routing protocols, sequential hypothesis testing, statistical testing, Sybil attack, Sybil attack detection, telecommunication security, Wireless sensor networks |
Abstract | Sybil attack poses a serious threat to geographic routing. In this attack, a malicious node attempts to broadcast incorrect location information, identity and secret key information. A Sybil node can tamper its neighboring nodes for the purpose of converting them as malicious. As the amount of Sybil nodes increase in the network, the network traffic will seriously affect and the data packets will never reach to their destinations. To address this problem, researchers have proposed several schemes to detect Sybil attacks. However, most of these schemes assume costly setup such as the use of relay nodes or use of expensive devices and expensive encryption methods to verify the location information. In this paper, the authors present a method to detect Sybil attacks using Sequential Hypothesis Testing. The proposed method has been examined using a Greedy Perimeter Stateless Routing (GPSR) protocol with analysis and simulation. The simulation results demonstrate that the proposed method is robust against detecting Sybil attacks. |
URL | http://ieeexplore.ieee.org/document/6884945/ |
DOI | 10.1109/ICSPCT.2014.6884945 |
Citation Key | 6884945 |
- network theory (graphs)
- wireless sensor networks
- telecommunication security
- Sybil attack detection
- Sybil attack
- statistical testing
- sequential hypothesis testing
- Routing protocols
- Robustness
- optimization
- network traffic
- Acoustics
- malicious node
- location information
- IEEE 802.11 Standards
- greedy perimeter stateless routing
- GPSR protocol
- geographic routing
- encryption methods
- Bandwidth
- actuators