Thwarting Sybil Attack by CAM Method in WSN using Cooja Simulator Framework

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In the area of IoT Sybil attack is vulnerable where the fake identities can manipulate or misuse pseudoidentities to negotiate the successof spam and Internet of Things. The nodes illegitimately claim multiple identities against sensor and Ad-Hoc networks. The hostile or faulty remote computing elements faces the security thread on large- scale peer-to-peer systems. We have a trust agency to certify the identities prevent from the “Sybil Attack”. Multiple identities that control sustainable fraction of systems so prevent from loss of information while data exchanging via networks or internet.In this paper the proposed CAM (Comparing and Matching) approach to prevent from Sybil attack by verifying the position of the sensors or node with their location ID. We match the ID of the node while data exchanging over network. We specifically given a complete assure security for WSN that these kinds of attack come out with unicast as well as multicast. We have practically analysis the simulation of network by gagingthe end-to-end delay, pack delivery and throughput of packets under the numerous circumstances to compute the effectiveness of packets. This simulation is on the erudite tool that is Cooja under a Contiki OS and highlight the security over data exchanging and exemplify the use feature for intrusion detection “Sybil Attack” in the Internet of Things.

     

     


  • Keywords


    IoT; WSN; Sybil attack; CAM; Position verification; Cooja.

  • References


      [1] A. Sehgal, V. Perelman, S. Kuryla, and J. Schonwalder, “Management of resource constrained devices in the Internet of Things,” IEEE Commun. Mag., vol. 50, no. 12, pp. 144–149, Dec. 2012.

      [2] K. Ren, W. Lou, K. Zeng, and P. Moran, “On broadcast authentication in wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 6, no. 11, pp. 4136–4144, Nov. 2007.

      [3] Y. Liu, K. Liu, and M. Li, “Passive diagnosis for wireless sensor networks,” IEEE/ACM Trans. Netw., vol. 18, no. 4, pp. 1132–1144, Aug. 2010.

      [4] C. Tang et al., “Comparative investigation on CSMA/CA-based opportunistic random access for Internet of Things,” IEEE Internet Things J., vol. 21, no. 1, pp. 33–41, Apr. 2014.

      [5] O. Bello and S. Zeadally, “Intelligent device-to-device communication in the Internet of Things,” IEEE Syst. J., to be published.

      [6] L. Foschini, T. Taleb, A. Corradi, and D. Bottazzi, “M2M-based metropolitan platform for IMS-enabled road traffic management in IoT,” IEEE Commun. Mag., vol. 49, no. 11, pp. 50–57, Nov. 2011.

      [7] W. He, G. Yan, and L. Xu, “Developing vehicular data cloud services in the IoT environment,” IEEE Trans. Ind. In format., vol. 10, no. 2, pp. 1587–1595, May 2014.

      [8] C. Perera, A. Zaslavsky, P. Christen, and D. Georgakopoulos, “Context aware computing for the Internet of Things: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 414–454, May 2014.

      [9] C. Lai et al., “CPAL: A conditional privacy-preserving authentication with access linkability for roaming service,” IEEE Internet Things J., vol. 1, no. 1, pp. 46–57, Feb. 2014.

      [10] H. Celdran, G. Clemente, G. Perez, and M. Perez, “SeCoMan: A semantic-aware policy framework for developing privacy preserving and context-aware smart applications,” IEEE Syst. J., to be published.

      [11] J. Huang, Y. Meng, X. Gong, Y. Liu, and Q. Duan, “A novel deployment scheme for green Internet of Things,” IEEE Internet Things J., vol. 1, no. 2, pp. 196–205, Apr. 2014.

      [12] A. Aziz, Y. Sekercioglu, P. Fitzpatrick, and M. Ivanovich, “A survey on distributed topology control techniques for extending the lifetime of battery powered wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 121–144, 2013.

      [13] K. Zhang, R. Lu, X. Liang, J. Qiao, and X. Shen, “PARK: A privacy preserving aggregation scheme with adaptive key management for smart grid,” in Proc. IEEE Int. Conf. Commun. China (ICCC), 2013, pp. 236–241.

      [14] M. Wen et al., “PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid,” IEEE Trans. Emerg. Topics Comput., vol. 1, no. 1, pp. 178–191, Jun. 2013.

      [15] X. Li et al., “Smart community: An Internet of Things application,” IEEE Commun. Mag., vol. 49, no. 11, pp. 68–75, Nov. 2011.

      [16] J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, “An information framework of creating a smart city through Internet of Things,” IEEE Internet Things J., vol. 1, no. 2, pp. 112–121, Apr. 2014.

      [17] P. Vlacheaset al., “Enabling smart cities through a cognitive management framework for the Internet of Things,” IEEE Commun. Mag., vol. 51, no. 6, pp. 102–111, Jun. 2013.

      [18] K. Ashton, That “Internet of Things” thing, RFID Journal, 2009.

      [19] Q. Lian et al., “An empirical study of collusion behaviour in the Maze P2P file-sharing system,” in Proc. IEEE Int. Conf. Distrib. Comput. Syst. (ICDCS), 2007, pp. 56–66.

      [20] M. Yang, Z. Zhang, X. Li, and Y. Dai, “An empirical study of freeriding behaviour in the Maze P2P file-sharing system,” in Proc. 4th Int. Workshop Peer-To-Peer Syst. (IPTPS), 2005, pp. 182–192.

      [21] K. Zhang, X. Liang, R. Lu, and X. Shen, “Exploiting multimedia services in mobile social network from security and privacy perspectives,” IEEECommun. Mag., vol. 52, no. 3, pp. 58–65, Mar. 2014.

      [22] Business insider. (2013, Mar.). [Online]. Available: http://www.businessinsider.com/facebook-targets-76-million-fake-users-in-war-onbogus-accounts-2013-2

      [23] J. R. Douceur. The Sybil attacks. In First International Workshop on Peer-to-Peer Systems (IPTPS ’02), Mar. 2002.

      [24] C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113–127, May 2003.

      [25] Liang Xiao, Student Member, Larry J. Greenstein, Narayan B. Mandayam, and Wade Trapper,” Channel-Based Detection of Sybil Attacks in Wireless Networks,” IEEE Transactions on Information Forensics and Security, Vol. 4(3), Sep. 2009.

      [26] Haifeng Yu, Michal Kaminky, Phillip B. Gibbon, Abraham D. Flaxman, Sybil guard: defending against Sybil via social networks, IEEE/ACM transaction on networking, jube 2008 vol. 16. P.576-589

      [27] Haifeng Yu, Michal Kaminky, Phillip B. Gibbon, Feng xiao, Sybil limit: near optimal via social networks defense attack, IEEE/ACM transaction on networking, jube 2010 vol 16. P 885 -898.

      [28] James newsome, Elaine shi, Dawn song, Adrian perrig the Sybil attack in sensor networks: analysis and defense.

      [29] M. demirbas, y. song. An RSSI based scheme for Sybil attack detection in wireless sensor network. Proceeding of international of symposium world of wireless, mobile, multimedia networks (WoWMoM’06) 2006 p. 564-570

      [30] A. B. Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram, A. S.K. Pathan, "A Novel Energy-Efficient Sybil Node Detection Algorithm for Intrusion Detection System in Wireless Sensor Networks”, 3rd International Conference onEco-friendly Computing and Communication Systems (ICECCS) 2014 IEEE.

      [31] T. G. Dhanalakshmi, N. Bharathi, M. Monisha, "Safety concerns of Sybil attack in WSN International Conference on Science Engineering and Management Research (ICSEMR), 2014 IEEE.

      [32] X. Zhenghong, C. Zhigang, "A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks, “International Forum on Information Technology and Applications (IFITA), 2010 (Volume:1) IEEE.

      [33] P. R. Vamsi, K. Kant, "A lightweight Sybil attack detection framework for Wireless Sensor Networks”, Seventh International Conference on Contemporary Computing (IC3), 2014. IEEE.

      [34] I. Makhdoom, M. Afzal, I. Rashid, "A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks", National Software Engineering Conference (NSEC), 2014. IEEE.

      [35] M. Li, Y. Xiong, X. Wu, X. Zhou, Y. Sun, S. Chen, X. Zhu, "A Regional Statistics Detection Scheme against Sybil Attacks in WSNs", 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2013. IEEE.

      [36] S. Sharmila1, G Umamaheswari2,” Detection of Sybil Attack in Mobile Wireless Sensor Networks,” Vol.2 (2), pp. 256 – 262, Mar-Apr 2012.

      [37] Kuo-Feng Ssu, Wei-Tong Wang, Wen-Chung Chang,” Detecting Sybil attacks in Wireless Sensor Networksusingneighbouring information,” Computer Networks, Vol.53(18), pp.3042-3056, AUG 2009.

      [38] Amol Vasudeva and Manu Sood,” Sybil Attack on Lowest Id Clustering Algorithm in The Mobile Ad Hoc
      Network,” International Journal of Network Security & Its Applications (IJNSA), Vol.4(5), Sep. 2012.

      [39] S. Capkun, J.P. Hubaux, and L. Buttyan,” Mobility helps peer-to –peer security,” IEEE Transactions on Mobile
      Computing, Vol.5(1), pp. 43 – 51, Jan. 2006.

      [40] Liang Xiao, Student Member, Larry J. Greenstein, Narayan B. Mandayam, and Wade Trapper,” Channel-Based Detection of Sybil Attacks in Wireless Networks,” IEEE Transactions on Information Forensics and Security, Vol. 4(3), Sep. 2009.

      [41] A. V. Pramod, Md, Abdul Azeem, M. Om Prakash,” Detecting the Sybil Attack in Wireless Sensor Network,”
      International Journal of Computers & Technology, Vol. 3(1), AUG. 2012.

      [42] Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons and Abraham D. Flaxman,” Sybil Guard: Defending Against Sybil Attacks via Social Networks,” IEEE/ACM Transactions on Networking, Vol. 16 (3), June 2008.

      [43] Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, and Feng Xiao,” Sybil Limit: A Near-Optimal Social Network Défense Against Sybil Attacks,” IEEE/ACM Transactions on Networking, Vol. 18(3), June 2010.

      [44] H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, “Sybil Guard: Defending against Sybil attacks via social networks,” IEEE ACM Transnet., vol. 16, no. 3, pp. 576–589, Jun. 2008.

      [45] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, “Sybil Limit: A near optimal social network defense against Sybil attacks,” IEEE/ACM Trans. Netw., vol. 18, no. 3, pp. 885–898, Jun. 2010.

      [46] D. Tran, B. Min, J. Li, and L. Subramanian, “Sybil resilient online content voting,” in Proc. USENIX Netw. Syst. Design Implement. (NSDI), 2009, pp. 15–28.

      [47] Y. Reddy, “A game theory approach to detect malicious nodes in wireless sensor networks,” in Proc. 3rd Int. Conf. Sensor Technol. Appl. (SENSORCOMM), 2009, pp. 462–468.

      [48] G. Wang et al., “You are how you click: Clickstream analysis for Sybil detection,” in Proc. 22nd USENIX Security Symp., 2013, pp. 241–255.

      [49] S.V. Manikanthan, T.Padmapriya, "United Approach in Authorized and Unauthorized Groups in LTE-A Pro", Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 10-Special Issue, 2018, pp. (1137-1145).


 

View

Download

Article ID: 27965
 
DOI: 10.14419/ijet.v7i4.19.27965




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.