Loading…
Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 6 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Sarigiannidis, Panagiotis Karapistoli, Eirini Economides, Anastasios A. |
description | Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results. |
doi_str_mv | 10.1109/PIMRC.2016.7794866 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7794866</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7794866</ieee_id><sourcerecordid>7794866</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-2e91b24f796a4da03f82e3e776d26e54717c2651222db0df50b0fec914a013073</originalsourceid><addsrcrecordid>eNotkMtKw0AYRkdBsNS8gG7mBVL_uc8sS_BSqFVswWWZZP7I2DQpMwHJ21uwqw8Oh7P4CLlnsGAM3OPH6u2zWnBgemGMk1brK1I4Y5kCB4Ir6a7JjDOtS6esuyVFzj8AIJi1AsSMbJa976Yc-28a-xATNiPdTnXsqB9H3xzyGdPk-zAcu4kGPHXDhIF-nc0Oc6Zb7POQ6AbH3yEd8h25aX2XsbjsnOyen3bVa7l-f1lVy3UZHYwlR8dqLlvjtJfBg2gtR4HG6MA1KmmYabhWjHMeagitghpabByTHpgAI-bk4T8bEXF_SvHo07S_HCD-ANbpT4E</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</title><source>IEEE Xplore All Conference Series</source><creator>Sarigiannidis, Panagiotis ; Karapistoli, Eirini ; Economides, Anastasios A.</creator><creatorcontrib>Sarigiannidis, Panagiotis ; Karapistoli, Eirini ; Economides, Anastasios A.</creatorcontrib><description>Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.</description><identifier>EISSN: 2166-9589</identifier><identifier>EISBN: 9781509032549</identifier><identifier>EISBN: 1509032541</identifier><identifier>DOI: 10.1109/PIMRC.2016.7794866</identifier><language>eng</language><publisher>IEEE</publisher><subject>Land mobile radio ; Mobile computing ; Peer-to-peer computing ; Security ; Sensors ; Wireless networks ; Wireless sensor networks</subject><ispartof>2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7794866$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7794866$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sarigiannidis, Panagiotis</creatorcontrib><creatorcontrib>Karapistoli, Eirini</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><title>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</title><title>2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)</title><addtitle>PIMRC</addtitle><description>Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.</description><subject>Land mobile radio</subject><subject>Mobile computing</subject><subject>Peer-to-peer computing</subject><subject>Security</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>2166-9589</issn><isbn>9781509032549</isbn><isbn>1509032541</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2016</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtKw0AYRkdBsNS8gG7mBVL_uc8sS_BSqFVswWWZZP7I2DQpMwHJ21uwqw8Oh7P4CLlnsGAM3OPH6u2zWnBgemGMk1brK1I4Y5kCB4Ir6a7JjDOtS6esuyVFzj8AIJi1AsSMbJa976Yc-28a-xATNiPdTnXsqB9H3xzyGdPk-zAcu4kGPHXDhIF-nc0Oc6Zb7POQ6AbH3yEd8h25aX2XsbjsnOyen3bVa7l-f1lVy3UZHYwlR8dqLlvjtJfBg2gtR4HG6MA1KmmYabhWjHMeagitghpabByTHpgAI-bk4T8bEXF_SvHo07S_HCD-ANbpT4E</recordid><startdate>201609</startdate><enddate>201609</enddate><creator>Sarigiannidis, Panagiotis</creator><creator>Karapistoli, Eirini</creator><creator>Economides, Anastasios A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201609</creationdate><title>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</title><author>Sarigiannidis, Panagiotis ; Karapistoli, Eirini ; Economides, Anastasios A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-2e91b24f796a4da03f82e3e776d26e54717c2651222db0df50b0fec914a013073</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Land mobile radio</topic><topic>Mobile computing</topic><topic>Peer-to-peer computing</topic><topic>Security</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Sarigiannidis, Panagiotis</creatorcontrib><creatorcontrib>Karapistoli, Eirini</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sarigiannidis, Panagiotis</au><au>Karapistoli, Eirini</au><au>Economides, Anastasios A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</atitle><btitle>2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)</btitle><stitle>PIMRC</stitle><date>2016-09</date><risdate>2016</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eissn>2166-9589</eissn><eisbn>9781509032549</eisbn><eisbn>1509032541</eisbn><abstract>Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.</abstract><pub>IEEE</pub><doi>10.1109/PIMRC.2016.7794866</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2166-9589 |
ispartof | 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, p.1-6 |
issn | 2166-9589 |
language | eng |
recordid | cdi_ieee_primary_7794866 |
source | IEEE Xplore All Conference Series |
subjects | Land mobile radio Mobile computing Peer-to-peer computing Security Sensors Wireless networks Wireless sensor networks |
title | Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T15%3A59%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analysing%20indirect%20Sybil%20attacks%20in%20randomly%20deployed%20Wireless%20Sensor%20Networks&rft.btitle=2016%20IEEE%2027th%20Annual%20International%20Symposium%20on%20Personal,%20Indoor,%20and%20Mobile%20Radio%20Communications%20(PIMRC)&rft.au=Sarigiannidis,%20Panagiotis&rft.date=2016-09&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.eissn=2166-9589&rft_id=info:doi/10.1109/PIMRC.2016.7794866&rft.eisbn=9781509032549&rft.eisbn_list=1509032541&rft_dat=%3Cieee_CHZPO%3E7794866%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-2e91b24f796a4da03f82e3e776d26e54717c2651222db0df50b0fec914a013073%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7794866&rfr_iscdi=true |