Loading…

Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks

Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such...

Full description

Saved in:
Bibliographic Details
Main Authors: Sarigiannidis, Panagiotis, Karapistoli, Eirini, Economides, Anastasios A.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 6
container_issue
container_start_page 1
container_title
container_volume
creator Sarigiannidis, Panagiotis
Karapistoli, Eirini
Economides, Anastasios A.
description Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.
doi_str_mv 10.1109/PIMRC.2016.7794866
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_7794866</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7794866</ieee_id><sourcerecordid>7794866</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-2e91b24f796a4da03f82e3e776d26e54717c2651222db0df50b0fec914a013073</originalsourceid><addsrcrecordid>eNotkMtKw0AYRkdBsNS8gG7mBVL_uc8sS_BSqFVswWWZZP7I2DQpMwHJ21uwqw8Oh7P4CLlnsGAM3OPH6u2zWnBgemGMk1brK1I4Y5kCB4Ir6a7JjDOtS6esuyVFzj8AIJi1AsSMbJa976Yc-28a-xATNiPdTnXsqB9H3xzyGdPk-zAcu4kGPHXDhIF-nc0Oc6Zb7POQ6AbH3yEd8h25aX2XsbjsnOyen3bVa7l-f1lVy3UZHYwlR8dqLlvjtJfBg2gtR4HG6MA1KmmYabhWjHMeagitghpabByTHpgAI-bk4T8bEXF_SvHo07S_HCD-ANbpT4E</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</title><source>IEEE Xplore All Conference Series</source><creator>Sarigiannidis, Panagiotis ; Karapistoli, Eirini ; Economides, Anastasios A.</creator><creatorcontrib>Sarigiannidis, Panagiotis ; Karapistoli, Eirini ; Economides, Anastasios A.</creatorcontrib><description>Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.</description><identifier>EISSN: 2166-9589</identifier><identifier>EISBN: 9781509032549</identifier><identifier>EISBN: 1509032541</identifier><identifier>DOI: 10.1109/PIMRC.2016.7794866</identifier><language>eng</language><publisher>IEEE</publisher><subject>Land mobile radio ; Mobile computing ; Peer-to-peer computing ; Security ; Sensors ; Wireless networks ; Wireless sensor networks</subject><ispartof>2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7794866$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7794866$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sarigiannidis, Panagiotis</creatorcontrib><creatorcontrib>Karapistoli, Eirini</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><title>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</title><title>2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)</title><addtitle>PIMRC</addtitle><description>Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.</description><subject>Land mobile radio</subject><subject>Mobile computing</subject><subject>Peer-to-peer computing</subject><subject>Security</subject><subject>Sensors</subject><subject>Wireless networks</subject><subject>Wireless sensor networks</subject><issn>2166-9589</issn><isbn>9781509032549</isbn><isbn>1509032541</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2016</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtKw0AYRkdBsNS8gG7mBVL_uc8sS_BSqFVswWWZZP7I2DQpMwHJ21uwqw8Oh7P4CLlnsGAM3OPH6u2zWnBgemGMk1brK1I4Y5kCB4Ir6a7JjDOtS6esuyVFzj8AIJi1AsSMbJa976Yc-28a-xATNiPdTnXsqB9H3xzyGdPk-zAcu4kGPHXDhIF-nc0Oc6Zb7POQ6AbH3yEd8h25aX2XsbjsnOyen3bVa7l-f1lVy3UZHYwlR8dqLlvjtJfBg2gtR4HG6MA1KmmYabhWjHMeagitghpabByTHpgAI-bk4T8bEXF_SvHo07S_HCD-ANbpT4E</recordid><startdate>201609</startdate><enddate>201609</enddate><creator>Sarigiannidis, Panagiotis</creator><creator>Karapistoli, Eirini</creator><creator>Economides, Anastasios A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201609</creationdate><title>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</title><author>Sarigiannidis, Panagiotis ; Karapistoli, Eirini ; Economides, Anastasios A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-2e91b24f796a4da03f82e3e776d26e54717c2651222db0df50b0fec914a013073</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Land mobile radio</topic><topic>Mobile computing</topic><topic>Peer-to-peer computing</topic><topic>Security</topic><topic>Sensors</topic><topic>Wireless networks</topic><topic>Wireless sensor networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Sarigiannidis, Panagiotis</creatorcontrib><creatorcontrib>Karapistoli, Eirini</creatorcontrib><creatorcontrib>Economides, Anastasios A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sarigiannidis, Panagiotis</au><au>Karapistoli, Eirini</au><au>Economides, Anastasios A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks</atitle><btitle>2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)</btitle><stitle>PIMRC</stitle><date>2016-09</date><risdate>2016</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eissn>2166-9589</eissn><eisbn>9781509032549</eisbn><eisbn>1509032541</eisbn><abstract>Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.</abstract><pub>IEEE</pub><doi>10.1109/PIMRC.2016.7794866</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2166-9589
ispartof 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), 2016, p.1-6
issn 2166-9589
language eng
recordid cdi_ieee_primary_7794866
source IEEE Xplore All Conference Series
subjects Land mobile radio
Mobile computing
Peer-to-peer computing
Security
Sensors
Wireless networks
Wireless sensor networks
title Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T15%3A59%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Analysing%20indirect%20Sybil%20attacks%20in%20randomly%20deployed%20Wireless%20Sensor%20Networks&rft.btitle=2016%20IEEE%2027th%20Annual%20International%20Symposium%20on%20Personal,%20Indoor,%20and%20Mobile%20Radio%20Communications%20(PIMRC)&rft.au=Sarigiannidis,%20Panagiotis&rft.date=2016-09&rft.spage=1&rft.epage=6&rft.pages=1-6&rft.eissn=2166-9589&rft_id=info:doi/10.1109/PIMRC.2016.7794866&rft.eisbn=9781509032549&rft.eisbn_list=1509032541&rft_dat=%3Cieee_CHZPO%3E7794866%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-2e91b24f796a4da03f82e3e776d26e54717c2651222db0df50b0fec914a013073%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7794866&rfr_iscdi=true