International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJPTT-V3I1P402 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I1P402

Security Issues and Sybil Attack in Wireless Sensor Networks


Pooja , Manisha, Dr. Yudhvir Singh

Citation :

Pooja , Manisha, Dr. Yudhvir Singh, "Security Issues and Sybil Attack in Wireless Sensor Networks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 1-6, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I1P402

Abstract


Due to broadcast nature of Wireless Sensor Networks and lack of tamper-resistant hardware, security in sensor networks is one of the major issues. Hence research is being done on many security attacks on wireless sensor networks. Sybil attack is a particular harmful attack. When a node illegitimately claims multiple identities or claims fake id, is called Sybil attack. This paper focuses on various security issues, security threats, Sybil attack and various methods to prevent Sybil attack.

Keywords

Wireless Sensor Networks, Security, Sybil Attack.

References

[1] Y. Zou, K. Chakrabarty, "Sensor deployment and target localization based on virtual forces", INFOCOM 2003. Twenty Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, Volume: 2, Pages: 1293 - 1303, April 2003.
[2] Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009. [3] E. Yoneki and J. Bacon, “A survey of Wireless Sensor Network technologies: research trends and middleware’s role”, Technical Report, 2005. http://www.cl.cam.ac.uk/TechReports, ISSN 1476-2986.
[4] J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security - a survey”, Security in Distributed, Grid, Mobile, and Pervasive Computing, Auerbach Publications, CRC Press, 2007.
[5] L.L. Fernandes ,“Introduction to Wireless Sensor Networks Report”, University of Trento. 2007,http://dit.unitn.it/~fernand/downloads/iwsn.pdf
[6] A.T. Zia, “A Security Framework for Wireless Sensor Networks”, 2008, http://ses.library.usyd.edu.au/bitstream/2123/ 2258/4/02whole.pdf
[7] P. Mohanty, S. A. Panigrahi, N. Sarma, and S. S. Satapathy, “Security Issues in Wireless Sensor Network Data Gathering Protocols: A Survey” Journal of Theoretical and Applied Information Technology, 2010, pp. 14-27.
[8] Shio Kumar Singh , M P Singh , and D K Singh “A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks”, International Journal of Computer Trends and Technology- May to June Issue 2011, ISSN: 2231- 2803.
[9] Mona Sharifnejad, Mohsen Sharifi, Mansoureh Ghiasabadi and Sareh Beheshti, “A Survey on Wireless Sensor Networks Security”, SETIT 2007 4th International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 25-29, 2007 – TUNISIA.
[10] M.J. Karmel Mary Belinda and C. Suresh Gnana Dhas, “A Study of Security in Wireless Sensor Networks”, MASAUM Journal of Reviews and Surveys”, Sept. 2009, vol. 1, Issue 1, pp. 91-95.
[11] H.K. Kalita and A. Kar, “Wireless Sensor Networks Security Analysis”, International Journal of Next-Generation Networks (IJNGN), vol. 1, no. 1, Dec. 2009, pp. 01-09.
[12] J. R. Douceur, "The Sybil Attack," in 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), March 2002.
[13] Hemanta Kumar Kalita and Avijit Kar ,“WIRELESS SENSOR NETWORK SECURITY ANALYSIS”, International Journal of Next-Generation Networks (IJNGN),Vol.1, No.1, December 2009.
[14] James Newsome, Elaine Shi. Dawn Song and Adrian Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses”, ZPSN’O4, April 26-27, 2004, Berkeley, California, USA. Copyright 2004 ACM 1-581 13-846-6/04/0004 ... $5.00.
[15] B. N. Levine, C. Shields, and N. B. Margolin, A survey of solutions to the Sybil attack, University of Massachusetts Amherst, Amherst, MA, 2006.
[16] H. Rowaihy, W. Enck, P. McDaniel, and T. La Porta. Limiting sybil attacks in structured p2p networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 2596 {2600, may 2007}
[17] Nitish Balachandran, Sugata Sanyal,” A Review of Techniques to Mitigate Sybil Attacks”, Int. J. Advanced Networking and Applications Volume: Issue: Pages.
[18] Karlof, C., Wagner, D., Secure routing in wireless sensor networks: Attacks and countermeasures, Ad hoc Networks Journal (Elsevier) 1(2–3) (2003) 293–315.
[19] Athichart Tangpong, Managing Sybil Identities in Distributed Systems, Ph.D. Thesis at the Pennsylvania State University, May 2010.
[20] Jitender Singh, Yudhvir Singh; “A Review of Security in Wireless Ad hoc Networks”; International Conf. on Challenges in Networking & Future of e- Commerce, CNFE-05