Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks
Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about loca...
Saved in:
Published in | 2009 Second International Conference on Developments in eSystems Engineering pp. 190 - 195 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2009
|
Subjects | |
Online Access | Get full text |
ISBN | 1424454018 9781424454013 |
DOI | 10.1109/DeSE.2009.27 |
Cover
Abstract | Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about location updates accordingly. In position verification, network nodes verify the position of each node and further ensure that each physical location is bounded by only one identity at any particular time. In this paper we will survey Sybil attack detection techniques and their related issues. Finally we will present our ideas about the Sybil attack detection via one-time localization (only at the entrance into the network) which significantly reduces the communication overhead unlike other schemes where per packet location tracking or periodic dissemination of location information is used to detect Sybil attacks. |
---|---|
AbstractList | Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not require centralisation. Nodes can locally determine their locations through received signal strength variations and inform neighbours about location updates accordingly. In position verification, network nodes verify the position of each node and further ensure that each physical location is bounded by only one identity at any particular time. In this paper we will survey Sybil attack detection techniques and their related issues. Finally we will present our ideas about the Sybil attack detection via one-time localization (only at the entrance into the network) which significantly reduces the communication overhead unlike other schemes where per packet location tracking or periodic dissemination of location information is used to detect Sybil attacks. |
Author | Merabti, M. Abbas, S. Llewellyn-Jones, D. |
Author_xml | – sequence: 1 givenname: S. surname: Abbas fullname: Abbas, S. organization: Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK – sequence: 2 givenname: M. surname: Merabti fullname: Merabti, M. organization: Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK – sequence: 3 givenname: D. surname: Llewellyn-Jones fullname: Llewellyn-Jones, D. organization: Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., Liverpool, UK |
BookMark | eNpFkD1PwzAYhI2gEqR0Y2PxH0ixX38kHkNbCFIFQ0CMlZO8KabBQbEl1H9PEEjccnfSoxsuIWd-8EjIFWdLzpm5WWO1WQJjZgnZCUm4BCmVZKBP_wvPZyT5YYxQuYZzsgjhnU2SCoTkF6Ss3N7bnlZxRL-Pb_TWBmxpdaxdT4sYbXOga4zYRDd46jx9dSP2GAItWloODX3E-DWMh3BJZp3tAy7-fE5e7jbPqzLdPt0_rIpt6nimYipFU-c1z4zVGnDKFgEMGI3QMWuEaQGttQ3nXa4y1eUcjeYMW8j0RORiTq5_dx0i7j5H92HH404Jo6ZPxDdyVk6K |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/DeSE.2009.27 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 1424454026 9781424454020 |
EndPage | 195 |
ExternalDocumentID | 5395109 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IG 6IK 6IL 6IM 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL RIO |
ID | FETCH-LOGICAL-i175t-43cb8b179a662ecb8ae229296e2f0a939d2eaaac11f8575f81e9610ed2762f083 |
IEDL.DBID | RIE |
ISBN | 1424454018 9781424454013 |
IngestDate | Wed Aug 27 03:00:33 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCN | 2009935862 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-43cb8b179a662ecb8ae229296e2f0a939d2eaaac11f8575f81e9610ed2762f083 |
PageCount | 6 |
ParticipantIDs | ieee_primary_5395109 |
PublicationCentury | 2000 |
PublicationDate | 2009-Dec. |
PublicationDateYYYYMMDD | 2009-12-01 |
PublicationDate_xml | – month: 12 year: 2009 text: 2009-Dec. |
PublicationDecade | 2000 |
PublicationTitle | 2009 Second International Conference on Developments in eSystems Engineering |
PublicationTitleAbbrev | DESE |
PublicationYear | 2009 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000452341 |
Score | 1.4857708 |
Snippet | Signal Strength based position verification is more promising as compared to other Sybil attack detection techniques because it is lightweight and does not... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 190 |
SubjectTerms | Ad hoc networking Broadcasting Communication system security Computer networks Cost function identity attack misbehaviour detection Mobile ad hoc networks Productivity Protocols Routing RSSI signal strength sybil attack Wireless communication Wireless networking Wireless networks |
Title | Signal Strength Based Sybil Attack Detection in Wireless Ad Hoc Networks |
URI | https://ieeexplore.ieee.org/document/5395109 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Qkyc1YPydHjw6oF031iMKZDGBmCAJN9J1r7hAhtFy0L_e123MaDx4e-2pafve-9J-73uE3KYQQWDQkTTmIk9IdMWIK-0Z6eTIQxC-cbXDk2kYz8XjIlg0yF1dCwMABfkMOs4s_vLTrd65p7Ju4Ds8IA_IAV6zslarfk9x0uAYkfe1WwhEWLSXdKrGfk18l90hzEalWiX_2VilyCvjIzLZr6ikk6w7O5t09Ocvscb_LvmYtL8r-OhTnZtOSAPyFoln2QrvDXU_0fnKvtB7TGEpnX0k2YYOrFV6TYdgC3JWTrOcOmrsBkMhHaQ03mo6LTnj720yH4-eH2Kv6qTgZQgPrCd8nUQJ-p4KQw5oK-AcgVEI3PSU9GXKQSmlGTOuY6eJGEjEVZByjJUGUdopaebbHM4INSzoS50I12dM9EUYaWF8H1EIMxINOCcttwvL11IsY1ltwMXf05fkkFcNGXrsijTt2w6uMcvb5KY43i9du6Jk |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEN0gHvSkBozf7sGjBbrdlu4RBVIViAmQcCPb7Sw2kGK0HPTXO9uWGo0Hb9OeNtvOvJfdN28IuYnAB1djIinEIosLTEWfSWVpYezIPeCONr3Dw5EXTPnjzJ1VyG3ZCwMAmfgMGibM7vKjtdqYo7Km6xg-IHbILuI-d_NurfJExZiDY03edm8hFbH9ralT8eyU0nfR7MK4l_tVsp-jVTJk6R-Q4XZNuaBk2dikYUN9_rJr_O-iD0n9u4ePPpfodEQqkNRIMI4X-OdQcxedLNIXeocgFtHxRxivaCdNpVrSLqSZPCuhcUKNOHaFxZB2IhqsFR3lqvH3Opn2e5P7wCpmKVgxEoTU4o4K_RCzT3oeA4wlMIbUyAOmW1I4ImIgpVS2rc3MTu3bIJBZQcSwWmrkacekmqwTOCFU225bqJCbSWO8zT1fce04yENsLTCAU1IzuzB_ze0y5sUGnP39-prsBZPhYD54GD2dk31WjGdo2Rekmr5t4BIxPw2vsk_9BRWSpbE |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+Second+International+Conference+on+Developments+in+eSystems+Engineering&rft.atitle=Signal+Strength+Based+Sybil+Attack+Detection+in+Wireless+Ad+Hoc+Networks&rft.au=Abbas%2C+S.&rft.au=Merabti%2C+M.&rft.au=Llewellyn-Jones%2C+D.&rft.date=2009-12-01&rft.pub=IEEE&rft.isbn=9781424454013&rft.spage=190&rft.epage=195&rft_id=info:doi/10.1109%2FDeSE.2009.27&rft.externalDocID=5395109 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424454013/sc.gif&client=summon&freeimage=true |