A SURVEY ON SYBIL ATTACK AND DETECTION FOR SECURITY
Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Abstract
Wireless sensor networks constitute of sensor nodes which are small in size, running on battery, limited computation power. we investigate, Sybil attack which is a node illegitimately asserts numerous characters and acquires multiple identities and performs as the original nodes causing disrupts in routing, voting, data leakage and data aggregation. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.
References
[1] Yingying chen, “Detecting and localizing identity-based attacks in wireless sensor network”,IEEE Journal, June 2010.
[2] Shaohe Lv, “Detecting the Sybil attack cooperatively in wireless sensor networks”, IEEE Conference, June 2008
[3] Dr. Manoj Kumar Jain, “Wireless Sensor Networks: Security Issues and Challenges”, IJCIT,2011.
[4] Y.Zhou, Y.Fang, Y.Zhang, "Security Wireless Sensor Networks: A Survey", IEEE Communication Surveys, Vol.10, No.3, 3rd Quarter2008.
[5] J. Newsome, E. Shi, D. Song and A. Perrig. “The Sybil Attack in Sensor Network: Analysis & Defenses”. In IPSN’04
[6] Karen Hsu, “Security Analysis on Defenses against Sybil Attacks in Wireless Sensor networks”IEEE Journal, 2008.
[7] M. Demirbasand Y. Song. ,”An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks”, IEEE Journal,2006.
[8] WEN Mi,LI Hui, ZHENG Yan-fei, CHEN Ke-fei, “TDOA-based Sybil attack detection scheme for wireless sensor network”,IEEEJournal 2006.
Keywords
Sensor network, Sybil attack, RSSI, TDOA,CRSD