A sybil attack detection scheme for a centralized clustering-based hierarchical network

Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu

Research output: Chapter in Book/Conference proceedingConference contributionpeer-review

63 Citations (Scopus)

Abstract

Wireless Sensor Networks (WSNs) have experienced phenomenal growth over the past decade. They are typically deployed in remote and hostile environments for monitoring applications and data collection. Miniature sensor nodes collaborate with each other to provide information on an unprecedented temporal and spatial scale. The resource-constrained nature of sensor nodes along with human-inaccessible terrains poses various security challenges to these networks at different layers. In this paper, we propose a novel detection scheme for Sybil attack in a centralized clustering-based hierarchical network. Sybil nodes are detected prior to cluster formation to prevent their forged identities from participating in cluster head selection. Only legitimate nodes are elected as cluster heads to enhance utilization of the resources. The proposed scheme requires collaboration of any two high energy nodes to analyze received signal strengths of neighboring nodes. The simulation results show that our proposed scheme significantly improves network lifetime in comparison with existing clustering-based hierarchical routing protocols.

Original languageEnglish
Title of host publicationProceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages318-325
Number of pages8
ISBN (Electronic)9781467379519
DOIs
Publication statusPublished - 2 Dec 2015
Externally publishedYes
Event14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015 - Helsinki, Finland
Duration: 20 Aug 201522 Aug 2015

Publication series

NameProceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
Volume1

Conference

Conference14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
Country/TerritoryFinland
CityHelsinki
Period20/08/1522/08/15

Keywords

  • Base Station
  • Cluster
  • Cluster Head
  • Sybil Attack
  • Wireless Sensor Network

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A sybil attack detection scheme for a centralized clustering-based hierarchical network'. Together they form a unique fingerprint.

Cite this