On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI

In a sybil attack, the adversary compromises nodes in the network and assigns them multiple fake identities, commonly referred to as sybil identities. Sybil node attacks can be crippling for a wireless sensor network, which operates under the 'majority is right' assumption. As the sybil no...

Full description

Saved in:
Bibliographic Details
Published in2010 IEEE Global Telecommunications Conference GLOBECOM 2010 pp. 1 - 5
Main Authors Misra, Satyajayant, Myneni, Sowmya
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2010
Subjects
Online AccessGet full text
ISBN1424456363
9781424456369
ISSN1930-529X
DOI10.1109/GLOCOM.2010.5683728

Cover

Abstract In a sybil attack, the adversary compromises nodes in the network and assigns them multiple fake identities, commonly referred to as sybil identities. Sybil node attacks can be crippling for a wireless sensor network, which operates under the 'majority is right' assumption. As the sybil nodes behave as normal nodes they are hard to identify. With the nodes in the network being able to regulate their transmission power, identification of sybil nodes becomes more difficult. This is because, the existing identification techniques, which depend on localization of the nodes, will localize the transmission power regulating sybil nodes at positions that are different from the positions of their corresponding compromised nodes. Consequently, it is difficult to differentiate the sybil node from a normal node. In this paper, we propose an enhanced RSSI-based technique to identify sybil nodes when they are regulating their transmission power.We also prove a necessary condition on the placement of the SNs in the network to guarantee zero false positives. Simulation results show that our technique is able to identify more than 98% of the sybil nodes in the network on an average, while suffering from very low false positives.
AbstractList In a sybil attack, the adversary compromises nodes in the network and assigns them multiple fake identities, commonly referred to as sybil identities. Sybil node attacks can be crippling for a wireless sensor network, which operates under the 'majority is right' assumption. As the sybil nodes behave as normal nodes they are hard to identify. With the nodes in the network being able to regulate their transmission power, identification of sybil nodes becomes more difficult. This is because, the existing identification techniques, which depend on localization of the nodes, will localize the transmission power regulating sybil nodes at positions that are different from the positions of their corresponding compromised nodes. Consequently, it is difficult to differentiate the sybil node from a normal node. In this paper, we propose an enhanced RSSI-based technique to identify sybil nodes when they are regulating their transmission power.We also prove a necessary condition on the placement of the SNs in the network to guarantee zero false positives. Simulation results show that our technique is able to identify more than 98% of the sybil nodes in the network on an average, while suffering from very low false positives.
Author Myneni, Sowmya
Misra, Satyajayant
Author_xml – sequence: 1
  givenname: Satyajayant
  surname: Misra
  fullname: Misra, Satyajayant
  email: misra@cs.nmsu.edu
  organization: Dept. of Comput. Sci., New Mexico State Univ., Las Cruces, NM, USA
– sequence: 2
  givenname: Sowmya
  surname: Myneni
  fullname: Myneni, Sowmya
  email: smyneni@cs.nmsu.edu
  organization: Dept. of Comput. Sci., New Mexico State Univ., Las Cruces, NM, USA
BookMark eNpFkM1Kw0AcxFesYFN9gl72BVL3M5scJWhbqE0xFsVL2ST_ldV0V3YDpW-vxYKnYeY3zGESNHLeAUJTSmaUkuJuvqrK6mnGyG8gs5wrll-ghAomhMy4opf_JuMjNKYFJ6lkxds1SmL8JESKXNIxeq8cXnbgBmuO1n3gjT9AwKV3Q_A93kAwPuxPoD42tsdr30HE1uFXG6CHGHENLvqA1zAcfPiKeBtP7ee6Xt6gK6P7CLdnnaDt48NLuUhX1XxZ3q9SS5Uc0rblrcgNUx0x0DHFtM6ELpjRhFKlckF4l8tGEm1oUzSKCsq0NJ2SrclkJvgETf92LQDsvoPd63DcnU_hP5EcVnE
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/GLOCOM.2010.5683728
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 1424456371
9781424456383
9781424456376
142445638X
EndPage 5
ExternalDocumentID 5683728
Genre orig-research
GroupedDBID 29I
6IE
6IH
6IK
6IM
AAJGR
ACGFS
ALMA_UNASSIGNED_HOLDINGS
CBEJK
IPLJI
M43
RIE
RIO
RNS
ID FETCH-LOGICAL-i175t-cc3c48f27d0fed272aa64a92fa011778403d85b50af1b9b71412a5fd75cf65643
IEDL.DBID RIE
ISBN 1424456363
9781424456369
ISSN 1930-529X
IngestDate Wed Aug 27 02:30:37 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-cc3c48f27d0fed272aa64a92fa011778403d85b50af1b9b71412a5fd75cf65643
PageCount 5
ParticipantIDs ieee_primary_5683728
PublicationCentury 2000
PublicationDate 2010-Dec.
PublicationDateYYYYMMDD 2010-12-01
PublicationDate_xml – month: 12
  year: 2010
  text: 2010-Dec.
PublicationDecade 2010
PublicationTitle 2010 IEEE Global Telecommunications Conference GLOBECOM 2010
PublicationTitleAbbrev GLOCOM
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0054851
ssj0000507002
Score 1.5302359
Snippet In a sybil attack, the adversary compromises nodes in the network and assigns them multiple fake identities, commonly referred to as sybil identities. Sybil...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Accuracy
Mathematical model
Measurement errors
Peer to peer computing
Power control
security
statistical
sybil
Tin
Wireless sensor networks
Title On Identifying Power Control Performing Sybil Nodes in Wireless Sensor Networks Using RSSI
URI https://ieeexplore.ieee.org/document/5683728
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8MgGCbbTnrxYzN-h4NHu1EoZZwX52LcR5xLFi8LUEgWl9Zs3UF_vVC6-hEP3kob0paQl-eF53leAG4MJUoZJAOjOQuikMmAR5IFiSBEa2QUIU6cPBzFg1n0MKfzGrittDBa64J8ptvusjjLTzK1dVtlHRrbdAp366Bup5nXalX7KcgCG4Qq6ygLxIvSixafIJts8flO1EVjEpOd11PZ5qUdUYh45_5x3BsPPeerfN-PwivFutM_AMPdF3u6yWt7m8u2-vhl5vjfXzoErS-FH5xUa9cRqOn0GOx_MydsgpdxCr2Mt5BCwYmrpwZ7ntoOJ15w4B5M3-VyBUdZojdwmULHp13Z-AmnNkPO1nDkieYbWLAT4JMN3y0w69899wZBWYkhWFp4kQdKERV1DWYJMjrBDAsRR4JjI5ylHLNJIkm6VFIkTCi5ZGEUYkFNwqgyFjBG5AQ00izVpwDGituONpDEwmaiMhRY4FBhpJWQEWPhGWi6UVq8ebONRTlA53_fvgB7uOKXXIJGvt7qK4sScnldTI9P-6e1RQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bT8IwGG0QH9QXL2C82wcfHXS9rOyZiKgMiEBCfCFt1yZEshkYD_rr7S7MS3zwbd3SbGuW7ztfd875ALgxjChlkHSM9rlDXS4dn0ruhIIQrZFRhKTi5KDvdSf0ccqmFXBbamG01hn5TDfSw-xffhirdbpV1mSeLadwawts27xPWa7WKndUkIU2CJXmURaKZ80XLUJBttzypxtZF_OIRzZuT8XYLwyJXOQ373uD9iDIWV_FHX-0XskyT2cfBJtnzgknr411Ihvq45ed439f6gDUvzR-cFhmr0NQ0dER2PtmT1gDL4MI5kLeTAwFh2lHNdjOye1wmEsO0gujdzlfwH4c6hWcRzBl1C5sBIUjWyPHS9jPqeYrmPET4LMN4HUw6dyN212n6MXgzC3ASByliKItg3mIjA4xx0J4VPjYiNRUjtsykYQtJhkSxpW-5C51sWAm5EwZCxkpOQbVKI70CYCe8u1EG0o8YWtR6QossKsw0kpIyrl7CmrpKs3ecruNWbFAZ3-fvgY73XHQm_Ue-k_nYBeXbJMLUE2Wa31pMUMir7JP5ROw_7iS
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+IEEE+Global+Telecommunications+Conference+GLOBECOM+2010&rft.atitle=On+Identifying+Power+Control+Performing+Sybil+Nodes+in+Wireless+Sensor+Networks+Using+RSSI&rft.au=Misra%2C+Satyajayant&rft.au=Myneni%2C+Sowmya&rft.date=2010-12-01&rft.pub=IEEE&rft.isbn=9781424456369&rft.issn=1930-529X&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FGLOCOM.2010.5683728&rft.externalDocID=5683728
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1930-529X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1930-529X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1930-529X&client=summon