Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks

Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about loca...

Full description

Saved in:
Bibliographic Details
Published in2009 Second International Conference on Developments in eSystems Engineering pp. 190 - 195
Main Authors Abbas, S., Merabti, M., Llewellyn-Jones, D.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2009
Subjects
Online AccessGet full text
ISBN1424454018
9781424454013
DOI10.1109/DeSE.2009.27

Cover

Abstract Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about location updates accordingly. In position verification, network nodes verify the position of each node and further ensure that each physical location is bounded by only one identity at any particular time. In this paper we will survey Sybil attack detection techniques and their related issues. Finally we will present our ideas about the Sybil attack detection via one-time localization (only at the entrance into the network) which significantly reduces the communication overhead unlike other schemes where per packet location tracking or periodic dissemination of location information is used to detect Sybil attacks.
AbstractList Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about location updates accordingly. In position verification, network nodes verify the position of each node and further ensure that each physical location is bounded by only one identity at any particular time. In this paper we will survey Sybil attack detection techniques and their related issues. Finally we will present our ideas about the Sybil attack detection via one-time localization (only at the entrance into the network) which significantly reduces the communication overhead unlike other schemes where per packet location tracking or periodic dissemination of location information is used to detect Sybil attacks.
Author Merabti, M.
Abbas, S.
Llewellyn-Jones, D.
Author_xml – sequence: 1
  givenname: S.
  surname: Abbas
  fullname: Abbas, S.
  organization: Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK
– sequence: 2
  givenname: M.
  surname: Merabti
  fullname: Merabti, M.
  organization: Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK
– sequence: 3
  givenname: D.
  surname: Llewellyn-Jones
  fullname: Llewellyn-Jones, D.
  organization: Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK
BookMark eNpFkD1PwzAYhI2gEqR0Y2PxH0ixX38kHkNbCFIFQ0CMlZO8KabBQbEl1H9PEEjccnfSoxsuIWd-8EjIFWdLzpm5WWO1WQJjZgnZCUm4BCmVZKBP_wvPZyT5YYxQuYZzsgjhnU2SCoTkF6Ss3N7bnlZxRL-Pb_TWBmxpdaxdT4sYbXOga4zYRDd46jx9dSP2GAItWloODX3E-DWMh3BJZp3tAy7-fE5e7jbPqzLdPt0_rIpt6nimYipFU-c1z4zVGnDKFgEMGI3QMWuEaQGttQ3nXa4y1eUcjeYMW8j0RORiTq5_dx0i7j5H92HH404Jo6ZPxDdyVk6K
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/DeSE.2009.27
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1424454026
9781424454020
EndPage 195
ExternalDocumentID 5395109
Genre orig-research
GroupedDBID 6IE
6IF
6IG
6IK
6IL
6IM
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
RIO
ID FETCH-LOGICAL-i175t-43cb8b179a662ecb8ae229296e2f0a939d2eaaac11f8575f81e9610ed2762f083
IEDL.DBID RIE
ISBN 1424454018
9781424454013
IngestDate Wed Aug 27 03:00:33 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009935862
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-43cb8b179a662ecb8ae229296e2f0a939d2eaaac11f8575f81e9610ed2762f083
PageCount 6
ParticipantIDs ieee_primary_5395109
PublicationCentury 2000
PublicationDate 2009-Dec.
PublicationDateYYYYMMDD 2009-12-01
PublicationDate_xml – month: 12
  year: 2009
  text: 2009-Dec.
PublicationDecade 2000
PublicationTitle 2009 Second International Conference on Developments in eSystems Engineering
PublicationTitleAbbrev DESE
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452341
Score 1.4857708
Snippet Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not...
SourceID ieee
SourceType Publisher
StartPage 190
SubjectTerms Ad hoc networking
Broadcasting
Communication system security
Computer networks
Cost function
identity attack
misbehaviour detection
Mobile ad hoc networks
Productivity
Protocols
Routing
RSSI
signal strength
sybil attack
Wireless communication
Wireless networking
Wireless networks
Title Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks
URI https://ieeexplore.ieee.org/document/5395109
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Qkyc1YPydHjw6oF031iMKZDGBmCAJN9J1r7hAhtFy0L_e123MaDx4e-2pafve-9J-73uE3KYQQWDQkTTmIk9IdMWIK-0Z6eTIQxC-cbXDk2kYz8XjIlg0yF1dCwMABfkMOs4s_vLTrd65p7Ju4Ds8IA_IAV6zslarfk9x0uAYkfe1WwhEWLSXdKrGfk18l90hzEalWiX_2VilyCvjIzLZr6ikk6w7O5t09Ocvscb_LvmYtL8r-OhTnZtOSAPyFoln2QrvDXU_0fnKvtB7TGEpnX0k2YYOrFV6TYdgC3JWTrOcOmrsBkMhHaQ03mo6LTnj720yH4-eH2Kv6qTgZQgPrCd8nUQJ-p4KQw5oK-AcgVEI3PSU9GXKQSmlGTOuY6eJGEjEVZByjJUGUdopaebbHM4INSzoS50I12dM9EUYaWF8H1EIMxINOCcttwvL11IsY1ltwMXf05fkkFcNGXrsijTt2w6uMcvb5KY43i9du6Jk
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0gHvSkBozf7sGjBbrdlu4RBVIViAmQcCPb7Sw2kGK0HPTXO9uWGo0Hb9OeNtvOvJfdN28IuYnAB1djIinEIosLTEWfSWVpYezIPeCONr3Dw5EXTPnjzJ1VyG3ZCwMAmfgMGibM7vKjtdqYo7Km6xg-IHbILuI-d_NurfJExZiDY03edm8hFbH9ralT8eyU0nfR7MK4l_tVsp-jVTJk6R-Q4XZNuaBk2dikYUN9_rJr_O-iD0n9u4ePPpfodEQqkNRIMI4X-OdQcxedLNIXeocgFtHxRxivaCdNpVrSLqSZPCuhcUKNOHaFxZB2IhqsFR3lqvH3Opn2e5P7wCpmKVgxEoTU4o4K_RCzT3oeA4wlMIbUyAOmW1I4ImIgpVS2rc3MTu3bIJBZQcSwWmrkacekmqwTOCFU225bqJCbSWO8zT1fce04yENsLTCAU1IzuzB_ze0y5sUGnP39-prsBZPhYD54GD2dk31WjGdo2Rekmr5t4BIxPw2vsk_9BRWSpbE
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+Second+International+Conference+on+Developments+in+eSystems+Engineering&rft.atitle=Signal+Strength+Based+Sybil+Attack+Detection+in+Wireless+Ad+Hoc+Networks&rft.au=Abbas%2C+S.&rft.au=Merabti%2C+M.&rft.au=Llewellyn-Jones%2C+D.&rft.date=2009-12-01&rft.pub=IEEE&rft.isbn=9781424454013&rft.spage=190&rft.epage=195&rft_id=info:doi/10.1109%2FDeSE.2009.27&rft.externalDocID=5395109
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/sc.gif&client=summon&freeimage=true