Special Issue Paper
Defending Sybil attacks based on neighboring relations in wireless sensor networks
Version of Record online: 1 FEB 2010
Copyright © 2010 John Wiley & Sons, Ltd.
Security and Communication Networks
Special Issue: Security in Ad Hoc Networks and Pervasive Computing
Volume 3, Issue 5, pages 408–420, September/October 2010
How to Cite
Wang, W.-T., Ssu, K.-F. and Chang, W.-C. (2010), Defending Sybil attacks based on neighboring relations in wireless sensor networks. Security Comm. Networks, 3: 408–420. doi: 10.1002/sec.197
- Issue online: 1 FEB 2010
- Version of Record online: 1 FEB 2010
- wireless sensor networks;
- Sybil attacks
As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95% when the network was not very sparse. Copyright © 2010 John Wiley & Sons, Ltd.