Detection of Localization Error in a WSN under Sybil Attack using Advanced DV-Hop Methodology
PDF
PDF

How to Cite

Suma, V. 2021. “Detection of Localization Error in a WSN under Sybil Attack Using Advanced DV-Hop Methodology”. IRO Journal on Sustainable Wireless Systems 3 (2): 87-96. https://doi.org/10.36548/jsws.2021.2.003.

Keywords

— WSN
— Sybil Attack
— Security localization
— Location node
— Location error
— DV-HOP
Published: 05-06-2021

Abstract

Localization is one of the most important aspects of Wireless Sensor Networks that make it applicable in a number of fields and areas. WSN advances in the technological aspects the number of attacks on the nodes of the WSN have also increased proficiently resulting in a number of security issues. One such attack is the Sybil attack which uses multiple pseudonymous identities to disrupt the reputation of the system. This paper is used to analyse the Sybil attacks using a detection and defence algorithm based on distance vector hop. Simulation of the results using the algorithm will be useful in effectively enhancing security of WSN nodes. In this proposed work based on the experimental analysis we have found out that with 50 beacon nodes, we have been able to decrease the average localisation error buy a solid 4% when compared with previous methodologies.

References

  1. Dinger, J., & Hartenstein, H. (2006, April). Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In First International Conference on Availability, Reliability and Security (ARES'06) (pp. 8-pp). IEEE.
  2. Chen, C., Wang, X., Han, W., & Zang, B. (2009, June). A robust detection of the sybil attack in urban vanets. In 2009 29th IEEE International Conference on Distributed Computing Systems Workshops (pp. 270-276). IEEE.
  3. Suma, V., & Haoxiang, W. (2020). Optimal Key Handover Management for Enhancing Security in Mobile Network. Journal of trends in Computer Science and Smart technology (TCSST), 2(04), 181-187.
  4. Patel, S. T., & Mistry, N. H. (2017, February). A review: sybil attack detection techniques in wsn. In 2017 4th International Conference on Electronics and Communication Systems (ICECS) (pp. 184-188). IEEE.
  5. Bhalaji, N. (2020). Reliable Data Transmission with Heightened Confidentiality and Integrity in IOT Empowered Mobile Networks. Journal of ISMAC, 2(02), 106-117.
  6. Baraneetharan, E. (2020). Role of Machine Learning Algorithms Intrusion Detection in WSNs: A Survey. Journal of Information Technology, 2(03), 161-173.
  7. Ruth Anita Shirley, D., Sasi Priya, S. (2018, August), Electromagnetic interference and its effect on the printed circuit board. Journal of Advanced Research in Dynamical and Control Systems, 2018, 10(12), pp. 684–688.
  8. Ashwini, G.V., Pandian, S.C., Shirley, D.R.A. (2019, November). Mitigating the effects of ESD using ESD capacitor and TVS diode. In International Journal of Innovative Technology and Exploring Engineering, 2019, 9(1), pp. 942–946.
  9. Piro, C., Shields, C., & Levine, B. N. (2006, August). Detecting the sybil attack in mobile ad hoc networks. In 2006 Securecomm and Workshops (pp. 1-11). IEEE.
  10. Shakya, S., & Pulchowk, L. N. (2020). The Robust Routing Protocol with Authentication for Wireless Adhoc Networks. Journal of ISMAC, 2(02), 83-95.
  11. Guette, G., & Ducourthial, B. (2007, October). On the Sybil attack detection in VANET. In 2007 IEEE international conference on Mobile Adhoc and sensor systems (pp. 1-6). IEEE.
  12. Kamani, J., & Parikh, D. (2015). A review on sybil attack detection techniques. J Res, 1(01).
  13. Gu, P., Khatoun, R., Begriche, Y., & Serhrouchni, A. (2017, March). Support vector machine (svm) based sybil attack detection in vehicular networks. In 2017 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6). IEEE.
  14. Pal, S., Mukhopadhyay, A. K., & Bhattacharya, P. P. (2008). Defending mechanisms against sybil attack in next generation mobile ad hoc networks. IETE Technical Review, 25(4), 209-215.
  15. Al-Qurishi, M., Alrubaian, M., Rahman, S. M. M., Alamri, A., & Hassan, M. M. (2018). A prediction system of Sybil attack in social network using deep-regression model. Future Generation Computer Systems, 87, 743-753.
  16. Adithya, M., Scholar, P. G., & Shanthini, B. (2020). Security Analysis and Preserving Block-Level Data DE-duplication in Cloud Storage Services. Journal of trends in Computer Science and Smart technology (TCSST), 2(02), 120-126.
  17. Smys, S., Basar, A., & Wang, H. (2020). Hybrid Intrusion Detection System for Internet of Things (IoT). Journal of ISMAC, 2(04), 190-199.
  18. Chen, D. J. I. Z., & Lai, K. L. (2020). Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method-A Study. Journal of Soft Computing Paradigm (JSCP), 2(04), 236-245.
  19. Smys, S. (2019). Energy-aware security routing protocol for WSN in big-data applications. Journal of ISMAC, 1(01), 38-55.
  20. Raj, J. S. (2020). Machine Learning Based Resourceful Clustering With Load Optimization for Wireless Sensor Networks. Journal of Ubiquitous Computing and Communication Technologies (UCCT), 2(01), 29-38.
  21. Mugunthan, S. R. (2020). Novel Cluster Rotating and Routing Strategy for software defined Wireless Sensor Networks. Journal of ISMAC, 2(02), 140-146.