Research Article | Open Access | Download PDF
Volume 3 | Issue 1 | Year 2013 | Article Id. IJPTT-V3I1P402 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I1P402Security Issues and Sybil Attack in Wireless Sensor Networks
Pooja , Manisha, Dr. Yudhvir Singh
Citation :
Pooja , Manisha, Dr. Yudhvir Singh, "Security Issues and Sybil Attack in Wireless Sensor Networks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 1, pp. 1-6, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I1P402
Abstract
Due to broadcast nature of Wireless Sensor Networks and lack of tamper-resistant hardware, security in sensor networks is one of the major issues. Hence research is being done on many security attacks on wireless sensor networks. Sybil attack is a particular harmful attack. When a node illegitimately claims multiple identities or claims fake id, is called Sybil attack. This paper focuses on various security issues, security threats, Sybil attack and various methods to prevent Sybil attack.
Keywords
Wireless Sensor Networks, Security, Sybil Attack.
References
[1] Y. Zou, K. Chakrabarty, "Sensor deployment and target
localization based on virtual forces", INFOCOM 2003. Twenty Second Annual Joint Conference of the IEEE Computer and
Communications Societies. IEEE, Volume: 2, Pages: 1293 -
1303, April 2003.
[2] Jun Zheng and Abbas Jamalipour, “Wireless Sensor
Networks: A Networking Perspective”, a book published by A
John & Sons, Inc, and IEEEE, 2009.
[3] E. Yoneki and J. Bacon, “A survey of Wireless Sensor
Network technologies: research trends and middleware’s role”,
Technical Report, 2005. http://www.cl.cam.ac.uk/TechReports,
ISSN 1476-2986.
[4] J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless
sensor network security - a survey”, Security in Distributed,
Grid, Mobile, and Pervasive Computing, Auerbach Publications,
CRC Press, 2007.
[5] L.L. Fernandes ,“Introduction to Wireless Sensor Networks
Report”, University of Trento.
2007,http://dit.unitn.it/~fernand/downloads/iwsn.pdf
[6] A.T. Zia, “A Security Framework for Wireless Sensor
Networks”, 2008, http://ses.library.usyd.edu.au/bitstream/2123/
2258/4/02whole.pdf
[7] P. Mohanty, S. A. Panigrahi, N. Sarma, and S. S. Satapathy,
“Security Issues in Wireless Sensor Network Data Gathering
Protocols: A Survey” Journal of Theoretical and Applied
Information Technology, 2010, pp. 14-27.
[8] Shio Kumar Singh , M P Singh , and D K Singh “A Survey
on Network Security and Attack Defense Mechanism For
Wireless Sensor Networks”, International Journal of Computer
Trends and Technology- May to June Issue 2011, ISSN: 2231-
2803.
[9] Mona Sharifnejad, Mohsen Sharifi, Mansoureh Ghiasabadi
and Sareh Beheshti, “A Survey on Wireless Sensor Networks
Security”, SETIT 2007 4th International Conference: Sciences
of Electronic, Technologies of Information and
Telecommunications March 25-29, 2007 – TUNISIA.
[10] M.J. Karmel Mary Belinda and C. Suresh Gnana Dhas, “A
Study of Security in Wireless Sensor Networks”, MASAUM
Journal of Reviews and Surveys”, Sept. 2009, vol. 1, Issue 1, pp.
91-95.
[11] H.K. Kalita and A. Kar, “Wireless Sensor Networks
Security Analysis”, International Journal of Next-Generation
Networks (IJNGN), vol. 1, no. 1, Dec. 2009, pp. 01-09.
[12] J. R. Douceur, "The Sybil Attack," in 1st International
Workshop on Peer-to-Peer Systems (IPTPS '02), March 2002.
[13] Hemanta Kumar Kalita and Avijit Kar ,“WIRELESS
SENSOR NETWORK SECURITY ANALYSIS”, International
Journal of Next-Generation Networks (IJNGN),Vol.1, No.1,
December 2009.
[14] James Newsome, Elaine Shi. Dawn Song and Adrian
Perrig, “The Sybil Attack in Sensor Networks: Analysis &
Defenses”, ZPSN’O4, April 26-27, 2004, Berkeley, California,
USA. Copyright 2004 ACM 1-581 13-846-6/04/0004 ... $5.00.
[15] B. N. Levine, C. Shields, and N. B. Margolin, A survey of
solutions to the Sybil attack, University of Massachusetts
Amherst, Amherst, MA, 2006.
[16] H. Rowaihy, W. Enck, P. McDaniel, and T. La Porta.
Limiting sybil attacks in structured p2p networks. In INFOCOM
2007. 26th IEEE International Conference on Computer
Communications. IEEE, pages 2596 {2600, may 2007}
[17] Nitish Balachandran, Sugata Sanyal,” A Review of
Techniques to Mitigate Sybil Attacks”, Int. J. Advanced
Networking and Applications Volume: Issue: Pages.
[18] Karlof, C., Wagner, D., Secure routing in wireless sensor
networks: Attacks and countermeasures, Ad hoc Networks
Journal (Elsevier) 1(2–3) (2003) 293–315.
[19] Athichart Tangpong, Managing Sybil Identities in
Distributed Systems, Ph.D. Thesis at the Pennsylvania State
University, May 2010.
[20] Jitender Singh, Yudhvir Singh; “A Review of Security in
Wireless Ad hoc Networks”; International Conf. on Challenges
in Networking & Future of e- Commerce, CNFE-05