期刊文献+

TDOA-based Sybil attack detection scheme for wireless sensor networks 被引量:5

TDOA-based Sybil attack detection scheme for wireless sensor networks
下载PDF
导出
摘要 As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node with multiple non-existent identities (ID) will cause harmful effects on decision-making or resource allocation in these applications. In this paper, we present an efficient and lightweight solution for Sybil attack detection based on the time difference of arrival (TDOA) between the source node and beacon nodes. This solution can detect the existence of Sybil attacks, and locate the Sybil nodes. We demonstrate efficiency of the solution through experiments. The experiments show that this solution can detect all Sybil attack cases without missing. As wireless sensor networks (WSN) are deployed in fire monitoring, object tracking applications, security emerges as a central requirement. A case that Sybil node illegitimately reports messages to the master node with multiple non-existent identities (ID) will cause harmful effects on decision-making or resource allocation in these applications. In this paper, we present an efficient and lightweight solution for Sybil attack detection based on the time difference of arrival (TDOA) between the source node and beacon nodes. This solution can detect the existence of Sybil attacks, and locate the Sybil nodes. We demonstrate efficiency of the solution through experiments. The experiments show that this solution can detect all Sybil attack cases without missing.
出处 《Journal of Shanghai University(English Edition)》 CAS 2008年第1期66-70,共5页 上海大学学报(英文版)
基金 the Specialized Research Foundation for the Doctoral Program of Higher Education(Grant No.20050248043)
关键词 attack detection Sybil attack.time difference of arrival (TDOA) wireless sensor networks (WSN) attack detection, Sybil attack.time difference of arrival (TDOA), wireless sensor networks (WSN)
  • 相关文献

参考文献9

  • 1DOUCEUR J R.The Sybil attack[].Proceedings of the First International Workshop on Peer-to-Peer Sys- tems(IPTPS‘).2002
  • 2KARLOF C,WAGNER D.Secure routing in wire- less sensor networks:attacks and countermea- sures[].Proceedings of the st IEEE International Workshop on Sensor Network Protocols and Applica- tions.2003
  • 3NEWSOME J,SHI E,SONG D,PERRING A.The Sybil attack in sensor networks:analysis & de- fenses[].Proceedings of the Third International Sym- posium on Information Processing in Sensor Networks (IPSN‘).2004
  • 4BAZZI R A,GORAN K.On the establishment of distinct identities in overlay networks[].ACM Symposium on Principles of Distributed Computing.2005
  • 5DEMIRBAS M,,SONG Y W.An RSSI-based scheme for sybil attack detection in wireless sensor net- works[].International Workshop on Wireless Mobile Multimedia(WOWMOM‘).2006
  • 6ZHANG Y C,LIU W,LOU W J,FANG Y G.Location- based compromise-tolerant security mechanisms for wireless sensor networks[].IEEE Journal on Selected Areas in Communications.2006
  • 7CHENG X,THAELER A,XUE G,CHEN D.TPS:a time-based positioning scheme for outdoor wireless sen- sor networks[].rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM‘).2004
  • 8CHAN Y T,HO K C.A simple and efficient estima- tor for hyperbolic location[].IEEE Transactions on Signal Processing.1994
  • 9R. I. Reza.Data Fusion for Improved TOA/TDOA Position Determination in Wireless Systems[].Dissertation for the Master Degree of Virginia Polytechnic Institute and State University.2000

同被引文献20

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部