Book Details


Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


Wireless sensor networks constitute of sensor nodes which are small in size, running on battery, limited computation power. we investigate, Sybil attack which is a node illegitimately asserts numerous characters and acquires multiple identities and performs as the original nodes causing disrupts in routing, voting, data leakage and data aggregation. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.


[1] Yingying chen, “Detecting and localizing identity-based attacks in wireless sensor network”,IEEE Journal, June 2010.

[2] Shaohe Lv, “Detecting the Sybil attack cooperatively in wireless sensor networks”, IEEE Conference, June 2008

[3] Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges”, IJCIT,2011.

[4] Y.Zhou, Y.Fang, Y.Zhang, "Security Wireless Sensor Networks: A Survey", IEEE Communication Surveys, Vol.10, No.3, 3rd Quarter2008.

[5] J. Newsome, E. Shi, D. Song and A. Perrig. “The Sybil Attack in Sensor Network: Analysis & Defenses”. In IPSN’04

[6] Karen Hsu, “Security Analysis on Defenses against Sybil Attacks in Wireless Sensor networks”IEEE Journal, 2008.

[7] M. Demirbasand Y. Song. ,”An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks”, IEEE Journal,2006.

[8] WEN Mi,LI Hui, ZHENG Yan-fei, CHEN Ke-fei, “TDOA-based Sybil attack detection scheme for wireless sensor network”,IEEEJournal 2006.


Sensor network, Sybil attack, RSSI, TDOA,CRSD

  • Format Volume 5, Issue 1, No 13, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author K.Girija, K.S.Saravanan
  • Reference IJCS-218
  • Page No 1359-1364

Copyright 2022 SK Research Group of Companies. All Rights Reserved.