System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Understanding packet delivery performance in dense wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
Impact of radio irregularity on wireless sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Experimental evaluation of wireless simulation assumptions
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Detecting and correcting malicious data in VANETs
Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks
Versatile low power media access for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
A cone-based distributed topology-control algorithm for wireless multi-hop networks
IEEE/ACM Transactions on Networking (TON)
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Regional-based authentication against dos attacks in wireless networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Wireless client puzzles in IEEE 802.11 networks: security by wireless
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Hierarchical localization strategy for wireless sensor networks
WSEAS Transactions on Computers
Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Distributed data source verification in wireless sensor networks
Information Fusion
The Quest for Mobility Models to Analyse Security in Mobile Ad Hoc Networks
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Detecting Sybil attacks in Wireless Sensor Networks using neighboring information
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobility and cooperation to thwart node capture attacks in MANETs
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Cognitive security protocol for sensor based VANET using Swarm intelligence
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
Interactive detection of network anomalies via coordinated multiple views
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
A novel defense mechanism against sybil attacks in VANET
Proceedings of the 3rd international conference on Security of information and networks
Defense against Sybil attack in vehicular ad hoc network based on roadside unit support
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Improving security in WMNs with reputation systems and self-organizing maps
Journal of Network and Computer Applications
Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Using predictable mobility patterns to support scalable and secure MANETs of handheld devices
MobiArch '11 Proceedings of the sixth international workshop on MobiArch
Exploiting overlapping channels for minimum power configuration in real-time sensor networks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Physical layer authentication over an OFDM fading wiretap channel
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools
Minimum transmission power configuration in real-time sensor networks with overlapping channels
ACM Transactions on Sensor Networks (TOSN)
Detecting Sybil attacks in VANETs
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
A sybil node impersonates other nodes by broadcasting messages with multiple node identifiers (ID). In contrast to existing solutions which are based on sharing encryption keys, we present a robust and lightweight solution for sybil attack problem based on received signal strength indicator (RSSI) readings of messages. Our solution is robust since it detects all sybil attack cases with 100% completeness and less than a few percent false positives. Our solution is lightweight in the sense that alongside the receiver we need the collaboration of one other node (i.e., only one message communication) for our protocol. We show through experiments that even though RSSI is time-varying and unreliable in general and radio transmission is non-isotropic, using ratio of RSSIs from multiple receivers it is feasible to overcome these problems.