Open Access   Article Go Back

Fuzzy based Sybil attack detection in Wireless Sensor Network

Palak 1

  1. Dept. Computer Engineering and Technology, Guru Nanak Dev University, Amritsar, India.

Correspondence should be addressed to: palakpalak23@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 50-56, Nov-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.5056

Online published on Nov 30, 2017

Copyright © Palak . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Palak, “Fuzzy based Sybil attack detection in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.50-56, 2017.

MLA Style Citation: Palak "Fuzzy based Sybil attack detection in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 5.11 (2017): 50-56.

APA Style Citation: Palak, (2017). Fuzzy based Sybil attack detection in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 5(11), 50-56.

BibTex Style Citation:
@article{_2017,
author = {Palak},
title = {Fuzzy based Sybil attack detection in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2017},
volume = {5},
Issue = {11},
month = {11},
year = {2017},
issn = {2347-2693},
pages = {50-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1539},
doi = {https://doi.org/10.26438/ijcse/v5i11.5056}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i11.5056}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1539
TI - Fuzzy based Sybil attack detection in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Palak
PY - 2017
DA - 2017/11/30
PB - IJCSE, Indore, INDIA
SP - 50-56
IS - 11
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
959 695 downloads 372 downloads
  
  
           

Abstract

Wireless Sensor Networks (WSNs) are mostly vulnerable to the various attacks. The performance of the wireless sensor networks plays vital role but attacks degrades the performance. One of the attacks is the Sybil attack, in which a malicious node creates a huge number of fake identities in the network. The study indicates that the UWB ranging-based Sybil attack detection in wireless sensor network has better results but it can be improved further by utilizing the optimistic decision making technique. This research work mainly focus on the wireless sensor network which use fuzzy membership function for Sybil attack detection which further improves the WSNs. This proposed technique provides 95% accuracy and higher the value of F-measure and lower the false probability rate and error rate.

Key-Words / Index Term

Wireless Sensor Network, Sybil attack, Fuzzy membership function

References

[1] Panagiotis Sarigiannidis, “Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information”, Elsevier, June 2015.
[2] Manju V C, “Sybil attack prevention in Wireless Sensor Network”, IJCNWMC 2014.
[3] N. M. Saravana Kumar, “Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission”, Springer 2014.
[4] P. Raghu Vamsi, “Detecting Sybil Attacks in Wireless Sensor Networks using Sequential Analysis”, International Journal on Smart Sensing and Intelligent System, Vol. 9, No. 2, 2015.
[5] Noor Alsaedi, “Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks” , IEEE 2015.
[6] P. Raghu Vamsi and Krishna Kant, “A Light-weight Sybil Attack Detection Framework for Wireless Sensor Networks”, IEEE 2014.
[7] P. Raghu Vamsi, Krishna Kant, “Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks”, ICSPCT 2014.
[8] J. Biswas, “WADP: an attack detection and prevention technique in MANET using modified AODV routing protocol,” in Proceedings of the 9th IEEE International Conference on Industrial and Information Systems (ICIIS ’14), pp. 1–6, December 2014.
[9] S. Ji, “attack detection algorithms in wireless network coding systems” IEEE Transactions on Mobile Computing, Vol. 14, No. 3, pp. 660–674, 2015.
[10] M. J. Kim, “Algebraic watchdog: mitigating misbehavior in wireless network coding” IEEE Journal on Selected Areas in Communications, Vol. 29, No. 10, pp. 1916– 1925, 2011.
[11] H. S. Chiu and K. S. Lui, “DePHI: detection mechanism for ad hoc wireless networks” in Proceedings of the IEEE 1st International Symposium on Wireless Pervasive Computing, pp. 1–6, January 2006.
[12] T. Hayajneh, “DeWorm: a simple protocol to detect attacks in wireless ad hoc networks” in Proceedings of the 3rd IEEE International Conference on Network and System Security (NSS ’09), pp. 73– 80, Gold Coast, Australia, October 2009.
[13] Reza Rafeh, “Detecting Sybil Nodes in Wireless Sensor Networks using Two-hop Messages”, Indian Journal of Science and Technology, Vol 7(9), 1359–1368, September 2014.
[14] R. Amuthavalli, “Detection and prevention of Sybil attack in wireless sensor network employing random password comparison method" Journal of Theoretical & Applied Information Technology, Vol. 67, No. 1, 2014.
[15] Wei Shi, Sanyang Liu, “A Light-weight Detection Mechanism against Sybil Attack in Wireless Sensor Network”, KSII Transactions of Internet ad Information Systems Vol. 9, NO. 9, September 2015.
[16] Imran Makhdoom, "A novel code attestation scheme against Sybil Attack in Wireless Sensor Networks" , National Software Engineering Conference (NSEC), IEEE 2014.
[17] T.G. Dhanalakshmi, “Safety concerns of Sybil attack in WSN”, IEEE 2014.
[18] Rupinder Singh, “TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks”, IJCSNS 2016.
[19] A. V. Vibi, “Detection of Sybil attack using neighboring node messaging using wireless sensor network” International Journal of Advanced Technology in Engineering and Science, Volume No. 3, Issue No. 3, ISSN (online): 2348 – 7550, March 2015.

[20] Udaya Suriya Raj Kumar Dhamodharan and Rajamani Vayanaperumal, “Detecting and preventing Sybil attacks in wire-less sensor networks using message authentication and passing method," The Scientific World Journal, 2015.
[21] Prabhjot Kaur, “Review Paper of Detection and Prevention of Sybil Attack in WSN Using Centralized IDs”, International Journal of Engineering Science and Computing, July 2016.
[22] A. B. Karuppiah, "A Novel Energy-Efficient Sybil Node Detection Algorithm for Intrusion Detection System in Wireless Sensor Networks", 3rd International Conference on Eco-friendly Computing and Communication Systems (ICECCS) IEEE 2014.
[23] T. G. Dhanalakshmi, "Safety concerns of Sybil attack in WSN”, International Conference on Science Engineering and Management Research (ICSEMR), IEEE 2014.
[24] Rupinder Singh, “A Novel Sybil Attack Detection Technique for Wireless Sensor Networks”, Advances in Computational Sciences and Technology ISSN 0973-6107 Vol.10, No. 2, pp. 185-202, 2017.
[25] Singh R, “Sybil Attack Countermeasures in Wireless Sensor Network”, International Journal of Computer Networks and Wireless Communications, Vol. 6, No. 3, May2016.