Akcije

Serbian Journal of Electrical Engineering
kako citirati ovaj članak
podeli ovaj članak

Metrika

  • citati u SCIndeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[]
  • posete u poslednjih 30 dana:1
  • preuzimanja u poslednjih 30 dana:0

Sadržaj

članak: 2 od 347  
Back povratak na rezultate
2022, vol. 19, br. 2, str. 193-206
Early detection mechanism for Sybil attacks on wireless multimedia sensor networks
(naslov ne postoji na srpskom)
aSri Dharmasthala Manjunatheshwara Institute of Technology, Ujire, Dakshina Kannada, Affiliated to Visvesvaraya Technological University, Belagavi, India
bSDM College of Engineering and Technology, Dharwad, Karnataka, India

e-adresabbpatilcs@gmail.com, srbiradar@gmail.com
Ključne reči: Attacks; Sensor; Node; Sybil; Security; WMSN
Sažetak
(ne postoji na srpskom)
The rapid developments in wireless multimedia sensor networks (WMSNs) have increased the demand for an efficient method of safeguarding multimedia data from attackers. As data are transmitted over a wireless medium, the authentication process needs to be provided with some efficient detection and prevention methods. The Sybil attack is one of the most common and involves replicating the identity of an original node in the network and behaving like a true node in order to retrieve/destroy information using this fake identity. An efficient enhanced random password comparison technique is proposed to detect and prevent Sybil attacks. The results of simulations indicate that the proposed method detects this type of attack more efficiently than existing methods. In addition to early detection, our application increases the throughput and reduces the average delay with an enhanced true detection rate. The identification of this malicious activity in its initial phases increases the efficiency of the system in terms of the data transmission process.
Reference
Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K. (2013) Lightweight Sybil Attack Detection in MANETs. IEEE Systems Journal, Vol. 7, No. 2, June, pp. 236 - 248
Akourmis, S., Fakhri, Y., Rahmani, M.D. (2018) Reducing Blackhole Effect in WSN. u: The International Conference on Innovations in Bio-Inspired Computing and Applications, Kochi, India, December, Proceedings of, 13-24
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E. (2002) Wireless sensor networks: A survey. Computer Networks, Vol. 38, No. 4, March, pp. 393 - 422
Alam, S., De, D. (2014) Analysis of Security Threats in Wireless Sensor Network. International Journal of Wireless & Mobile Networks, Vol. 6, No. 2, April, pp. 35 - 46
Alsaedi, N., Hashim, F., Sali, A., Rokhani, F.Z. (2017) Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS). Computer Communications, Vol. 110, September, pp. 75 - 82
Douceur, J.R. (2002) The Sybil Attack. u: The International Workshop on Peer-to-Peer Systems (IPTPS) (1st), Cambridge, USA, March, Proceedings of, 251-260
Elhoseny, M., Hassanien, A.E. (2019) Secure Data Transmission in WSN: An Overview. u: Dynamic Wireless Sensor Networks (Studies in Systems, Decision and Control), Cham: Springer International Publishing, Ch. 6, Vol. 165, pp. 115 - 43, 1 st Edition
Gao, H., Wu, R., Cao, M., Zhang, C. (2014) Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network. u: The International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP) (14th), Dalian, China, August, Proceedings of, 601-610
Hemanth, K.T., Kowshik, K.V.K., Revathi, M. (2019) Detection of Blackhole Attacks in Wireless Sensor Networks. International Journal of Innovative Technology and Exploring Engineering, Vol. 8, No. 11s, September, pp. 1203 - 1205
Issariyakul, T., Hossain, E. (2009) Introduction to Network Simulator 2 (NS2). New York-London: Springer, Ch. 2, 2 nd Edition
Jamshidi, M., Zangeneh, E., Esnaashari, M., Darwesh, A.M., Meybodi, M.R. (2019) A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It. Wireless Personal Communications, Vol. 105, No. 1, March, pp. 145 - 173
Jan, M.A., Nanda, P., He, X., Liu, R.P. (2018) A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems, Vol. 80, March, pp. 613 - 626
Jayashree, S., Mohanraj, T. (2015) Vampire Attack Detection in Wireless Sensor Networks. International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, No. 2, February, pp. 751 - 756
Kardi, A., Zagrouba, R. (2019) Attacks classification and security mechanisms in Wireless Sensor Networks. Advances in Science, Technology and Engineering Systems Journal, Vol. 4, No. 6, November, pp. 229 - 243
Karlof, C., Wagner, D. (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. u: The IEEE International Workshop on Sensor Network Protocols and Applications (1st), Anchorage, USA, May, Proceedings of, 113-127
Keerthika, M., Shanmugapriya, D. (2021) Wireless Sensor Networks: Active and Passive attacks-Vulnerabilities and Countermeasures. Global Transitions Proceedings, Vol. 2, No. 2, November, pp. 362 - 367
Kowsalya, R., Roseline, J.B. (2021) Cluster based data-aggregation using lightweight cryptographic algortihm for wireless sensor networks. Materials Today: Proceedings, February, pp. 1 - 8
Kumar, D.U.S.R., Vayanaperumal, R. (2015) Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method. Scientific World Journal, Vol. 2015, July, p. 841267
Kumari, D., Singh, K., Manjul, M. (2020) Performance Evaluation of Sybil Attack in Cyber Physical System. Procedia Computer Science, Vol. 167, pp. 1013 - 1027
Mi, W., Hui, L., Yan-Fei, Z., Ke-Fei, Ch. (2008) TDOA-Based Sybil Attack Detection Scheme for Wireless Sensor Networks. Journal of Shanghai University, Vol. 12, No. 1, February, pp. 66 - 70
Newsome, J., Shi, E., Song, D., Perrig, A. (2004) The Sybil Attack in Sensor Networks: Analysis & Defenses. u: The International Symposium on Information Processing in Sensor Networks (IPSN) (3rd), Berkeley, USA, April, Proceedings of, 259-268
Portillo, C., Martinez-Bauset, J., Pla, V. (2018) Modelling of S-MAC for Heterogeneous WSN. u: The IFIP International Conference on New Technologies, Mobility and Security (NTMS) (9th), Paris, France, February, Proceedings of, pp. 1 - 6
Raja, N.K., Beno, M.M. (2017) Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto (FO) Authentication Scheme Against Sybil Attack. Journal of Medical Systems, Vol. 41, No. 7, July, pp. 107
Rehman, A., Rehman, S.U., Raheem, H. (2018) Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wireless Personal Communications, Vol. 106, No. 4, June, pp. 2291 - 2313
Santhi, G., Sowmiya, R. (2017) A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks. International Journal of Computer Applications, Vol. 159, No. 7, February, pp. 7 - 11
Sarma, H.K., Kar, A. (2006) Security Threats in Wireless Sensor Networks. u: The Annual International Carnahan Conference on Security Technology (40th), Lexington, USA, October, Proceedings of, 243-251
Saud, K.M., Khan, N.M. (2016) Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks. Journal of Sensors, Vol. 2016, August, pp. 9783072
Shi, W., Liu, S.Y., Zhang, Z. (2015) A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network. KSII Transactions on Internet and Information Systems, Vol. 9, No. 9, September, pp. 3738 - 3750
Sujatha, V., Mary, A.E.A. (2019) Identity based Scheme A gainst Sybil Attacks in Wireless Sensor Networks. International Journal of Engineering and Advanced Technology, Vol. 9, No. 1, October, pp. 5350 - 5355
Vinet, L., Zhedanov, A. (2011) A 'missing' family of classical orthogonal polynomials. Journal of Physics A: Mathematical and Theoretical, Vol. 44, No. 8, February, pp. 1 - 16
Wadii, J., Rim, H., Ridha, B. (2019) Detecting and preventing Sybil attacks in wireless sensor networks. u: The IEEE Mediterranean Microwave Symposium (MMS) (19th), Hammamet, Tunisia, October, Proceedings of, October, pp. 1 - 5
Yousefpoor, M.S., Yousefpoor, E.S., Barati, H., Barati, A., Movaghar, A., Hosseinzadeh, M. (2021) Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. Journal of Network and Computer Applications, Vol. 190, September, pp. 103118
 

O članku

jezik rada: engleski
vrsta rada: neklasifikovan
DOI: 10.2298/SJEE2202193P
objavljen u SCIndeksu: 29.07.2022.
Creative Commons License 4.0

Povezani članci

Nema povezanih članaka