SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
DOI : 10.5121/ijist.2014.4314 107
SYBILSECURE: AN ENERGY EFFICIENT
SYBIL ATTACK DETECTION TECHNIQUE
IN WIRELESS SENSOR NETWORK
Mr. A. Babu Karuppiah1
, A. Raja Prakash2
1
Assistant Professor,
2
Final year student,
1, 2
Velammal College of Engineering and Technology, Madurai, India
ABSTRACT:
A wireless sensor network consists of many sensor nodes which are deployed to monitor physical or
environmental conditions and to pass the collected data to a base station. Though wireless sensor network
is subjected to have major applications in all the areas, it also has many security threats and attacks.
Among all threats such as sinkhole, wormhole, selective forwarding, denial of service and node replication,
Sybil attack is a major attack where a single node has multiple identities. When a Sybil node act as a
sender, it can send false data to its neighbors. When it acts as receiver, it can receive the data which is
originally destined for a legitimate node. The existing solutions consume more energy. So an energy
efficient algorithm named Sybilsecure is proposed. Experimental results show that Sybilsecure consumes
less energy than existing defense mechanisms.
KEYWORDS:
Wireless sensor network, Sybil, cluster head, query packet.
1. INTRODUCTION:
Wireless sensor networks consist of as many numbers of nodes which can communicate with
each other. Each node consists of a microcontroller, an electronic circuit for interfacing with
sensors and battery, a radio transceiver and an external memory. Wireless sensor networks are
being used for various applications such as area monitoring, healthcare monitoring and
monitoring the combat zone for security purposes. But due to the broadcast nature in wireless
communication and low physical protection of sensor nodes, an intruder can easily tend to attack
the network. Various attacks on each layer are listed in the table below.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
108
Table 1. Attacks on different layers
Layer Attack
Physical Jamming , Node
destruction
Data link Denial of service
Network Spoofing, replaying,
Hello floods,Homing
,Sybil
Transport SYN flood , De
synchronization attack
Application Reprogramming attacks
In this paper, an efficient algorithm against Sybil attack is proposed as it is a huge destructive
attack in sensor networks. In case of Sybil attack, a sensor node behaves as if it were a larger
number of nodes, by faking other nodes. Sybilsecure is based on the querying and acknowledging
the nodes.
2. RELATED WORK:
The existing mechanisms include centralized and decentralized approaches. The vast
implemented solution is trusted certification [12],[13]. This solution assumes that there is a
special trusted third party or central authority, which can verify the validity of each participant,
and further issues a certification for the honest one. In reality, such certification can be a special
hardware device or a digital number. Note that essentially both of them are a series of digits, but
are stored on different media. Before a participant joins a peer-to-peer system, provides votes, or
obtains services from the system, first his identity must be verified. This method gets its
limitation when it is applied for larger network. Another method works based on the resource
used by the node. If a Sybil node exists then it has to perform the tasks of the identities it possess.
So when it exceeds a threshold value then the Sybil node is detected. [14].Secret key [15] can
also be shared but it consumes more power as it involves in complex encryption and decryption
techniques. In contrast to existing solutions that are based on sharing encryption keys, RSSI based
scheme [16] presents a solution for Sybil attack based on received signal strength indicator
(RSSI) readings of messages. Though it is said to be lightweight (i.e., only one message
communication), it is time-varying, unreliable and radio transmission is non-isotropic. Accuracy
reduces as the transmission distance increases. Recent researches in Sybil defense mechanisms
are based on Social network based schemes [1] [2] [3] [4] [8] [10] [13] [14]. These schemes use
the trust structure embodied in the networks. They have two assumptions, 1) Sybil nodes can
create arbitrarily number of identities but relationship to non-Sybil nodes. Sybil nodes are poorly
connected to non-Sybil nodes. 2) One trusted non-Sybil node is known. Based on these
assumptions various defense schemes such as Sybilguard, Sybillimit, Sybilcontrol , Sybilinfer ,
Sumup,Gatekeeper are proposed.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
109
3. PROPOSED WORK:
The proposed solution is based on sending and responding to the query sent by the cluster head.
The Cluster head has a list of its sub nodes parameters. The parameters are the identities and their
location.
Fig.1. Network with a Cluster head, 4 legitimate nodes and a Sybil node.
Table 2. Dataset in Cluster head
The Cluster head broadcasts a query packet to all the sub nodes in such a way that it expects a
reply that all the sub nodes must send their id and location. There are there cases in which the
Sybil node reacts.
(i) No reply:
When a query packet is received by all the legitimate sub nodes including Sybil node, it does not
respond to it. It simply gets the packet and drops it. Whenever retransmission is done for multiple
times, the Sybil node does not respond to it.
(ii) Replies with same Identity and different coordinates:
In this case, all the legitimate sub nodes respond to the cluster head with their identity and
location. The Sybil node also responds to the cluster head with any one of the Sub nodes identity
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
109
3. PROPOSED WORK:
The proposed solution is based on sending and responding to the query sent by the cluster head.
The Cluster head has a list of its sub nodes parameters. The parameters are the identities and their
location.
Fig.1. Network with a Cluster head, 4 legitimate nodes and a Sybil node.
Table 2. Dataset in Cluster head
The Cluster head broadcasts a query packet to all the sub nodes in such a way that it expects a
reply that all the sub nodes must send their id and location. There are there cases in which the
Sybil node reacts.
(i) No reply:
When a query packet is received by all the legitimate sub nodes including Sybil node, it does not
respond to it. It simply gets the packet and drops it. Whenever retransmission is done for multiple
times, the Sybil node does not respond to it.
(ii) Replies with same Identity and different coordinates:
In this case, all the legitimate sub nodes respond to the cluster head with their identity and
location. The Sybil node also responds to the cluster head with any one of the Sub nodes identity
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
109
3. PROPOSED WORK:
The proposed solution is based on sending and responding to the query sent by the cluster head.
The Cluster head has a list of its sub nodes parameters. The parameters are the identities and their
location.
Fig.1. Network with a Cluster head, 4 legitimate nodes and a Sybil node.
Table 2. Dataset in Cluster head
The Cluster head broadcasts a query packet to all the sub nodes in such a way that it expects a
reply that all the sub nodes must send their id and location. There are there cases in which the
Sybil node reacts.
(i) No reply:
When a query packet is received by all the legitimate sub nodes including Sybil node, it does not
respond to it. It simply gets the packet and drops it. Whenever retransmission is done for multiple
times, the Sybil node does not respond to it.
(ii) Replies with same Identity and different coordinates:
In this case, all the legitimate sub nodes respond to the cluster head with their identity and
location. The Sybil node also responds to the cluster head with any one of the Sub nodes identity
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
110
and its own location. For example, If a cluster head has 4 nodes say 1,2,3,4 with the location x, y,
z, a respectively, Sybil node must have any one these identity (1/2/3/4) and its own location d.
Now the Sybil node responds with any one of these identities and the location d. The cluster head
already has the set of legitimate nodes identity and location. Conflicts arise when the legitimate
node and Sybil node has same and different location. The node with the different location is
detected as Sybil node.
Table 3. Acknowledgements received
(iii) Replies with same identity and same coordinates:
This case will be future scope of this paper.
4. ENERGY CALCULATION:
In wireless sensor network energy consumption is a major factor. Because when a node runs out
of battery, it becomes a major problem in network. A dead node will affect entire communication.
So the energy consumed by the network to detect a Sybil node is calculated. Based on the
formulae from [17], the energy values are calculated. Equations (1) and (2) show the energy for
cluster head and a node respectively.
EN(ij) = b Vsup Isense Tsense + b Vsup (IwriteTwrite +Iread Tread) + b Eelec + Bdn
ij Eamp + TA
Vsup[CN IA + (1-CN)IS] . . . (1)
ECH(j)= h3 b Vsup Isense Tsense + h4 Vsup (IwriteTwrite +Iread Tread) + h1 b1 NCYC Cavg V2
SUP
(nj+1) + h1 b1 Vsup (I0 e (Vsup/Np VT)
(NCYC/f) (nj+1)
+ h2 b1 Eelec (nj)+ h2 b2 (1+ ) dn
j Eamp + h2 b2 Eelec + TCH Vsup [CCH IA + (1-CCh)IS]+ Eactu Nact
. . . (2)
Consider a network which has a cluster head and four nodes. The tables below show the energy
consumed by cluster head and sensor node.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
110
and its own location. For example, If a cluster head has 4 nodes say 1,2,3,4 with the location x, y,
z, a respectively, Sybil node must have any one these identity (1/2/3/4) and its own location d.
Now the Sybil node responds with any one of these identities and the location d. The cluster head
already has the set of legitimate nodes identity and location. Conflicts arise when the legitimate
node and Sybil node has same and different location. The node with the different location is
detected as Sybil node.
Table 3. Acknowledgements received
(iii) Replies with same identity and same coordinates:
This case will be future scope of this paper.
4. ENERGY CALCULATION:
In wireless sensor network energy consumption is a major factor. Because when a node runs out
of battery, it becomes a major problem in network. A dead node will affect entire communication.
So the energy consumed by the network to detect a Sybil node is calculated. Based on the
formulae from [17], the energy values are calculated. Equations (1) and (2) show the energy for
cluster head and a node respectively.
EN(ij) = b Vsup Isense Tsense + b Vsup (IwriteTwrite +Iread Tread) + b Eelec + Bdn
ij Eamp + TA
Vsup[CN IA + (1-CN)IS] . . . (1)
ECH(j)= h3 b Vsup Isense Tsense + h4 Vsup (IwriteTwrite +Iread Tread) + h1 b1 NCYC Cavg V2
SUP
(nj+1) + h1 b1 Vsup (I0 e (Vsup/Np VT)
(NCYC/f) (nj+1)
+ h2 b1 Eelec (nj)+ h2 b2 (1+ ) dn
j Eamp + h2 b2 Eelec + TCH Vsup [CCH IA + (1-CCh)IS]+ Eactu Nact
. . . (2)
Consider a network which has a cluster head and four nodes. The tables below show the energy
consumed by cluster head and sensor node.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
110
and its own location. For example, If a cluster head has 4 nodes say 1,2,3,4 with the location x, y,
z, a respectively, Sybil node must have any one these identity (1/2/3/4) and its own location d.
Now the Sybil node responds with any one of these identities and the location d. The cluster head
already has the set of legitimate nodes identity and location. Conflicts arise when the legitimate
node and Sybil node has same and different location. The node with the different location is
detected as Sybil node.
Table 3. Acknowledgements received
(iii) Replies with same identity and same coordinates:
This case will be future scope of this paper.
4. ENERGY CALCULATION:
In wireless sensor network energy consumption is a major factor. Because when a node runs out
of battery, it becomes a major problem in network. A dead node will affect entire communication.
So the energy consumed by the network to detect a Sybil node is calculated. Based on the
formulae from [17], the energy values are calculated. Equations (1) and (2) show the energy for
cluster head and a node respectively.
EN(ij) = b Vsup Isense Tsense + b Vsup (IwriteTwrite +Iread Tread) + b Eelec + Bdn
ij Eamp + TA
Vsup[CN IA + (1-CN)IS] . . . (1)
ECH(j)= h3 b Vsup Isense Tsense + h4 Vsup (IwriteTwrite +Iread Tread) + h1 b1 NCYC Cavg V2
SUP
(nj+1) + h1 b1 Vsup (I0 e (Vsup/Np VT)
(NCYC/f) (nj+1)
+ h2 b1 Eelec (nj)+ h2 b2 (1+ ) dn
j Eamp + h2 b2 Eelec + TCH Vsup [CCH IA + (1-CCh)IS]+ Eactu Nact
. . . (2)
Consider a network which has a cluster head and four nodes. The tables below show the energy
consumed by cluster head and sensor node.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
111
Table 4. Energy consumed by cluster head
Cluster head Energy Consumed
(J)
Transmit 0.00784
Transient 0.049
Sense 0.594
Data logging 0.0000385
Receive 0.00384
Table 5. Energy consumed by each node
Sensor node Energy consumed
Transmit 0.00088
Transient 0.012
Sense 0.54
Data logging 0.000035
Receive 0.00349
Upon simulation Sybilsecure takes about 11.327 J to detect a Sybil node. But when considering
other social based defense schemes such as Sybilguard and Sybillimit consumes more energy
than Sybilsecure. Sybillimit consumes around 8.8 J for a period of time. Sybilguard consumes
about 13.48 J for a single round.
5. EXPERIMENTAL RESULTS AND COMPARISONS:
Fig 2.Energy consumed to detect Sybil nodes.
0
20
40
60
80
100
120
140
160
180
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
111
Table 4. Energy consumed by cluster head
Cluster head Energy Consumed
(J)
Transmit 0.00784
Transient 0.049
Sense 0.594
Data logging 0.0000385
Receive 0.00384
Table 5. Energy consumed by each node
Sensor node Energy consumed
Transmit 0.00088
Transient 0.012
Sense 0.54
Data logging 0.000035
Receive 0.00349
Upon simulation Sybilsecure takes about 11.327 J to detect a Sybil node. But when considering
other social based defense schemes such as Sybilguard and Sybillimit consumes more energy
than Sybilsecure. Sybillimit consumes around 8.8 J for a period of time. Sybilguard consumes
about 13.48 J for a single round.
5. EXPERIMENTAL RESULTS AND COMPARISONS:
Fig 2.Energy consumed to detect Sybil nodes.
Sybillimit
Sybilguard
Sybilsecure
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
111
Table 4. Energy consumed by cluster head
Cluster head Energy Consumed
(J)
Transmit 0.00784
Transient 0.049
Sense 0.594
Data logging 0.0000385
Receive 0.00384
Table 5. Energy consumed by each node
Sensor node Energy consumed
Transmit 0.00088
Transient 0.012
Sense 0.54
Data logging 0.000035
Receive 0.00349
Upon simulation Sybilsecure takes about 11.327 J to detect a Sybil node. But when considering
other social based defense schemes such as Sybilguard and Sybillimit consumes more energy
than Sybilsecure. Sybillimit consumes around 8.8 J for a period of time. Sybilguard consumes
about 13.48 J for a single round.
5. EXPERIMENTAL RESULTS AND COMPARISONS:
Fig 2.Energy consumed to detect Sybil nodes.
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
112
Fig 3. Absence of Sybil node
Fig 4. Presence of Sybil node
6. CONCLUSION:
In this paper, Sybilsecure,an energy efficient algorithm is proposed based on sending and
acknowledging the query data packets. Social network based schemes which involved in random
International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014
113
routes of data consumed more energy to detect a Sybil node. But in Sybilsecure , a Sybil node can
be detected with less energy and also without decreasing its efficiency.
REFERENCES:
[1] Bimal Viswanath, Mainack Mondal, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan
Mislove, and Ansley Post, “Exploring the design space of social network-based Sybil defenses”,
IEEE 2012.
[2] Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian , Sherman S.M. Chow ,”Optimal Sybil-
resilient node admission control ”,IEEE, 2009.
[3] Bimal Viswanath, Ansley Post, Krishna P. Gummadi, Alan Mislove, “An Analysis of Social
Network-Based Sybil Defenses”, SIGCOMM’10.
[4] H. Yu, M. Kaminsky, P. B. Gibbons and A.Flaxman. “Sybilguard: defending against sybil attacks
via social networks”, SIGCOMM 06.
[5] H. Yu, P. B. Gibbons, M. Kaminsky, and F.Xiao “Sybillimit: A near-optimal social network defense
against sybilattacks” In IEEE Symposium on Security and Privacy, 2008.
[6] H. Yu, “Sybil defenses via social networks: a tutorial and survey, ACM SIGACT News, 2011.
[7] G. Danezis, P. Mittal, “SybilInfer: Detecting Sybil nodes using social networks”,in Proc. of ISOC
NDSS, 2009.
[8] F. Li, P. Mittal, M. Caesar, N. Borisov, “SybilControl: practical Sybil defense with computational
puzzles”, 7th ACM workshop on Scalable trusted computing, 2012.
[9] C. Lesniewski-Lass, M. F. Kaashoek, “Whanau: A sybil-proof distributed hash table”, 7th USENIX
Symposium on Network Design and Implementation, 2010.
[10] Wei Wei, Fengyuan Xu, “SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social
Networks”, Parallel and Distributed Systems, IEEE, 2013.
[11] Nitish Balachandran, Sugata Sanyal,”A Review of Techniques to Mitigate Sybil Attacks”,
International Journal of Advanced Networking and Applications, 2012.
[12] J. R. Douceur, “The Sybil attack”, In Proceedings for the First International Workshop on Peer-to-
Peer Systems (IPTPS’02), ser. LNCS, vol. 2429. Cambridge, MA, USA: Springer, Mar. 2002, pp.
251–260.
[13] B. N. Levine, C. Shields, and N. B. Margolin, “A survey of solutions to the Sybil attack”, University
of Massachusetts Amherst, Amherst, MA, 2006.
[14] J. Newsome, E. Shi, D. Song, and A. Perrig. “The Sybil attack in sensor networks: analysis &
defences”, In Proceedings of the hird international symposium on Information processing in sensor
networks, pages 259–268, 2004.
[15] W. Du, J. Deng, Y. S. Han, and P. K. Varshney,” A pairwise key pre-distribution scheme for wireless
sensor networks”. In ACM CCS 2003, pages 42–51, Oct. 2003
[16] Murat Demirbas, Youngwhan Song, “An RSSI-based Scheme for Sybil Attack Detection in Wireless
Sensor Networks, In Proceedings of WoWMoM 2006 International Symposium on a World of
Wireless, Mobile and Multimedia Networks, 2006. 5 pp. – 570.
[17] M. N. Halgamuge, M. Zukerman, and K. Ramamohanarao, H. L. Vu , “An Estimation Of Sensor
Energy Consumption”, Progress In Electromagnetics Research B, Vol. 12, 259–295, 2009.

More Related Content

What's hot

Heuristic Route Discovery for Shared Firewall Network
Heuristic Route Discovery for Shared Firewall NetworkHeuristic Route Discovery for Shared Firewall Network
Heuristic Route Discovery for Shared Firewall NetworkIOSR Journals
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanicalijcisjournal
 
IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...
IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...
IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...IRJET Journal
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...ijeei-iaes
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionIJCSIS Research Publications
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueijcsit
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...sangasandeep
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wirelessjpstudcorner
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksIAEME Publication
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection systemiaemedu
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...cscpconf
 

What's hot (20)

Heuristic Route Discovery for Shared Firewall Network
Heuristic Route Discovery for Shared Firewall NetworkHeuristic Route Discovery for Shared Firewall Network
Heuristic Route Discovery for Shared Firewall Network
 
PPID3 AICCSA08
PPID3 AICCSA08PPID3 AICCSA08
PPID3 AICCSA08
 
Cryptography from quantum mechanical
Cryptography from quantum mechanicalCryptography from quantum mechanical
Cryptography from quantum mechanical
 
IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...
IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...
IRJET- Finding the Original Writer of an Anonymous Text using Naïve Bayes Cla...
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
Simulation Time and Energy Test for Topology Construction Protocol in Wireles...
 
7 ijcse-01229
7 ijcse-012297 ijcse-01229
7 ijcse-01229
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
 
170 328-1-pb
170 328-1-pb170 328-1-pb
170 328-1-pb
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
 
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
Protected Data Collection In WSN by Filtering Attackers Influence (Published ...
 
41 125-1-pb
41 125-1-pb41 125-1-pb
41 125-1-pb
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wireless
 
Research on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networksResearch on key predistribution scheme of wireless sensor networks
Research on key predistribution scheme of wireless sensor networks
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
 
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Pr...
 

Similar to Sybilsecure an energy efficient

A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...Editor IJCATR
 
A review of sybil attack in manet
A review of sybil attack in manetA review of sybil attack in manet
A review of sybil attack in maneteSAT Journals
 
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORKSYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORKIJNSA Journal
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsEditor IJMTER
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNIJTET Journal
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKIJNSA Journal
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...Alexander Decker
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...ijitjournal
 
Sybil limit a near optimal social network defense against sybil attacks-2014
Sybil limit a near optimal social network defense against sybil attacks-2014Sybil limit a near optimal social network defense against sybil attacks-2014
Sybil limit a near optimal social network defense against sybil attacks-2014Vignesh Biggboss
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 

Similar to Sybilsecure an energy efficient (20)

Ijetcas14 538
Ijetcas14 538Ijetcas14 538
Ijetcas14 538
 
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
A Lightweight Algorithm for Detecting Sybil Attack in Mobile Wireless Sensor ...
 
A review of sybil attack in manet
A review of sybil attack in manetA review of sybil attack in manet
A review of sybil attack in manet
 
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORKSYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
SYBIL ATTACK ON LOWEST ID CLUSTERING ALGORITHM IN THE MOBILE AD HOC NETWORK
 
A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...A review of security attacks and intrusion detection schemes in wireless sens...
A review of security attacks and intrusion detection schemes in wireless sens...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Network Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSNNetwork Lifetime Enhancement by Node Deployment in WSN
Network Lifetime Enhancement by Node Deployment in WSN
 
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKCROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORK
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
M045077578
M045077578M045077578
M045077578
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
 
A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...A security method for multiple attacks in sensor networks against the false r...
A security method for multiple attacks in sensor networks against the false r...
 
Sybil limit a near optimal social network defense against sybil attacks-2014
Sybil limit a near optimal social network defense against sybil attacks-2014Sybil limit a near optimal social network defense against sybil attacks-2014
Sybil limit a near optimal social network defense against sybil attacks-2014
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 

More from ijistjournal

Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithmijistjournal
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKijistjournal
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 

More from ijistjournal (20)

Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithm
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Sybilsecure an energy efficient

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 DOI : 10.5121/ijist.2014.4314 107 SYBILSECURE: AN ENERGY EFFICIENT SYBIL ATTACK DETECTION TECHNIQUE IN WIRELESS SENSOR NETWORK Mr. A. Babu Karuppiah1 , A. Raja Prakash2 1 Assistant Professor, 2 Final year student, 1, 2 Velammal College of Engineering and Technology, Madurai, India ABSTRACT: A wireless sensor network consists of many sensor nodes which are deployed to monitor physical or environmental conditions and to pass the collected data to a base station. Though wireless sensor network is subjected to have major applications in all the areas, it also has many security threats and attacks. Among all threats such as sinkhole, wormhole, selective forwarding, denial of service and node replication, Sybil attack is a major attack where a single node has multiple identities. When a Sybil node act as a sender, it can send false data to its neighbors. When it acts as receiver, it can receive the data which is originally destined for a legitimate node. The existing solutions consume more energy. So an energy efficient algorithm named Sybilsecure is proposed. Experimental results show that Sybilsecure consumes less energy than existing defense mechanisms. KEYWORDS: Wireless sensor network, Sybil, cluster head, query packet. 1. INTRODUCTION: Wireless sensor networks consist of as many numbers of nodes which can communicate with each other. Each node consists of a microcontroller, an electronic circuit for interfacing with sensors and battery, a radio transceiver and an external memory. Wireless sensor networks are being used for various applications such as area monitoring, healthcare monitoring and monitoring the combat zone for security purposes. But due to the broadcast nature in wireless communication and low physical protection of sensor nodes, an intruder can easily tend to attack the network. Various attacks on each layer are listed in the table below.
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 108 Table 1. Attacks on different layers Layer Attack Physical Jamming , Node destruction Data link Denial of service Network Spoofing, replaying, Hello floods,Homing ,Sybil Transport SYN flood , De synchronization attack Application Reprogramming attacks In this paper, an efficient algorithm against Sybil attack is proposed as it is a huge destructive attack in sensor networks. In case of Sybil attack, a sensor node behaves as if it were a larger number of nodes, by faking other nodes. Sybilsecure is based on the querying and acknowledging the nodes. 2. RELATED WORK: The existing mechanisms include centralized and decentralized approaches. The vast implemented solution is trusted certification [12],[13]. This solution assumes that there is a special trusted third party or central authority, which can verify the validity of each participant, and further issues a certification for the honest one. In reality, such certification can be a special hardware device or a digital number. Note that essentially both of them are a series of digits, but are stored on different media. Before a participant joins a peer-to-peer system, provides votes, or obtains services from the system, first his identity must be verified. This method gets its limitation when it is applied for larger network. Another method works based on the resource used by the node. If a Sybil node exists then it has to perform the tasks of the identities it possess. So when it exceeds a threshold value then the Sybil node is detected. [14].Secret key [15] can also be shared but it consumes more power as it involves in complex encryption and decryption techniques. In contrast to existing solutions that are based on sharing encryption keys, RSSI based scheme [16] presents a solution for Sybil attack based on received signal strength indicator (RSSI) readings of messages. Though it is said to be lightweight (i.e., only one message communication), it is time-varying, unreliable and radio transmission is non-isotropic. Accuracy reduces as the transmission distance increases. Recent researches in Sybil defense mechanisms are based on Social network based schemes [1] [2] [3] [4] [8] [10] [13] [14]. These schemes use the trust structure embodied in the networks. They have two assumptions, 1) Sybil nodes can create arbitrarily number of identities but relationship to non-Sybil nodes. Sybil nodes are poorly connected to non-Sybil nodes. 2) One trusted non-Sybil node is known. Based on these assumptions various defense schemes such as Sybilguard, Sybillimit, Sybilcontrol , Sybilinfer , Sumup,Gatekeeper are proposed.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 109 3. PROPOSED WORK: The proposed solution is based on sending and responding to the query sent by the cluster head. The Cluster head has a list of its sub nodes parameters. The parameters are the identities and their location. Fig.1. Network with a Cluster head, 4 legitimate nodes and a Sybil node. Table 2. Dataset in Cluster head The Cluster head broadcasts a query packet to all the sub nodes in such a way that it expects a reply that all the sub nodes must send their id and location. There are there cases in which the Sybil node reacts. (i) No reply: When a query packet is received by all the legitimate sub nodes including Sybil node, it does not respond to it. It simply gets the packet and drops it. Whenever retransmission is done for multiple times, the Sybil node does not respond to it. (ii) Replies with same Identity and different coordinates: In this case, all the legitimate sub nodes respond to the cluster head with their identity and location. The Sybil node also responds to the cluster head with any one of the Sub nodes identity International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 109 3. PROPOSED WORK: The proposed solution is based on sending and responding to the query sent by the cluster head. The Cluster head has a list of its sub nodes parameters. The parameters are the identities and their location. Fig.1. Network with a Cluster head, 4 legitimate nodes and a Sybil node. Table 2. Dataset in Cluster head The Cluster head broadcasts a query packet to all the sub nodes in such a way that it expects a reply that all the sub nodes must send their id and location. There are there cases in which the Sybil node reacts. (i) No reply: When a query packet is received by all the legitimate sub nodes including Sybil node, it does not respond to it. It simply gets the packet and drops it. Whenever retransmission is done for multiple times, the Sybil node does not respond to it. (ii) Replies with same Identity and different coordinates: In this case, all the legitimate sub nodes respond to the cluster head with their identity and location. The Sybil node also responds to the cluster head with any one of the Sub nodes identity International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 109 3. PROPOSED WORK: The proposed solution is based on sending and responding to the query sent by the cluster head. The Cluster head has a list of its sub nodes parameters. The parameters are the identities and their location. Fig.1. Network with a Cluster head, 4 legitimate nodes and a Sybil node. Table 2. Dataset in Cluster head The Cluster head broadcasts a query packet to all the sub nodes in such a way that it expects a reply that all the sub nodes must send their id and location. There are there cases in which the Sybil node reacts. (i) No reply: When a query packet is received by all the legitimate sub nodes including Sybil node, it does not respond to it. It simply gets the packet and drops it. Whenever retransmission is done for multiple times, the Sybil node does not respond to it. (ii) Replies with same Identity and different coordinates: In this case, all the legitimate sub nodes respond to the cluster head with their identity and location. The Sybil node also responds to the cluster head with any one of the Sub nodes identity
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 110 and its own location. For example, If a cluster head has 4 nodes say 1,2,3,4 with the location x, y, z, a respectively, Sybil node must have any one these identity (1/2/3/4) and its own location d. Now the Sybil node responds with any one of these identities and the location d. The cluster head already has the set of legitimate nodes identity and location. Conflicts arise when the legitimate node and Sybil node has same and different location. The node with the different location is detected as Sybil node. Table 3. Acknowledgements received (iii) Replies with same identity and same coordinates: This case will be future scope of this paper. 4. ENERGY CALCULATION: In wireless sensor network energy consumption is a major factor. Because when a node runs out of battery, it becomes a major problem in network. A dead node will affect entire communication. So the energy consumed by the network to detect a Sybil node is calculated. Based on the formulae from [17], the energy values are calculated. Equations (1) and (2) show the energy for cluster head and a node respectively. EN(ij) = b Vsup Isense Tsense + b Vsup (IwriteTwrite +Iread Tread) + b Eelec + Bdn ij Eamp + TA Vsup[CN IA + (1-CN)IS] . . . (1) ECH(j)= h3 b Vsup Isense Tsense + h4 Vsup (IwriteTwrite +Iread Tread) + h1 b1 NCYC Cavg V2 SUP (nj+1) + h1 b1 Vsup (I0 e (Vsup/Np VT) (NCYC/f) (nj+1) + h2 b1 Eelec (nj)+ h2 b2 (1+ ) dn j Eamp + h2 b2 Eelec + TCH Vsup [CCH IA + (1-CCh)IS]+ Eactu Nact . . . (2) Consider a network which has a cluster head and four nodes. The tables below show the energy consumed by cluster head and sensor node. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 110 and its own location. For example, If a cluster head has 4 nodes say 1,2,3,4 with the location x, y, z, a respectively, Sybil node must have any one these identity (1/2/3/4) and its own location d. Now the Sybil node responds with any one of these identities and the location d. The cluster head already has the set of legitimate nodes identity and location. Conflicts arise when the legitimate node and Sybil node has same and different location. The node with the different location is detected as Sybil node. Table 3. Acknowledgements received (iii) Replies with same identity and same coordinates: This case will be future scope of this paper. 4. ENERGY CALCULATION: In wireless sensor network energy consumption is a major factor. Because when a node runs out of battery, it becomes a major problem in network. A dead node will affect entire communication. So the energy consumed by the network to detect a Sybil node is calculated. Based on the formulae from [17], the energy values are calculated. Equations (1) and (2) show the energy for cluster head and a node respectively. EN(ij) = b Vsup Isense Tsense + b Vsup (IwriteTwrite +Iread Tread) + b Eelec + Bdn ij Eamp + TA Vsup[CN IA + (1-CN)IS] . . . (1) ECH(j)= h3 b Vsup Isense Tsense + h4 Vsup (IwriteTwrite +Iread Tread) + h1 b1 NCYC Cavg V2 SUP (nj+1) + h1 b1 Vsup (I0 e (Vsup/Np VT) (NCYC/f) (nj+1) + h2 b1 Eelec (nj)+ h2 b2 (1+ ) dn j Eamp + h2 b2 Eelec + TCH Vsup [CCH IA + (1-CCh)IS]+ Eactu Nact . . . (2) Consider a network which has a cluster head and four nodes. The tables below show the energy consumed by cluster head and sensor node. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 110 and its own location. For example, If a cluster head has 4 nodes say 1,2,3,4 with the location x, y, z, a respectively, Sybil node must have any one these identity (1/2/3/4) and its own location d. Now the Sybil node responds with any one of these identities and the location d. The cluster head already has the set of legitimate nodes identity and location. Conflicts arise when the legitimate node and Sybil node has same and different location. The node with the different location is detected as Sybil node. Table 3. Acknowledgements received (iii) Replies with same identity and same coordinates: This case will be future scope of this paper. 4. ENERGY CALCULATION: In wireless sensor network energy consumption is a major factor. Because when a node runs out of battery, it becomes a major problem in network. A dead node will affect entire communication. So the energy consumed by the network to detect a Sybil node is calculated. Based on the formulae from [17], the energy values are calculated. Equations (1) and (2) show the energy for cluster head and a node respectively. EN(ij) = b Vsup Isense Tsense + b Vsup (IwriteTwrite +Iread Tread) + b Eelec + Bdn ij Eamp + TA Vsup[CN IA + (1-CN)IS] . . . (1) ECH(j)= h3 b Vsup Isense Tsense + h4 Vsup (IwriteTwrite +Iread Tread) + h1 b1 NCYC Cavg V2 SUP (nj+1) + h1 b1 Vsup (I0 e (Vsup/Np VT) (NCYC/f) (nj+1) + h2 b1 Eelec (nj)+ h2 b2 (1+ ) dn j Eamp + h2 b2 Eelec + TCH Vsup [CCH IA + (1-CCh)IS]+ Eactu Nact . . . (2) Consider a network which has a cluster head and four nodes. The tables below show the energy consumed by cluster head and sensor node.
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 111 Table 4. Energy consumed by cluster head Cluster head Energy Consumed (J) Transmit 0.00784 Transient 0.049 Sense 0.594 Data logging 0.0000385 Receive 0.00384 Table 5. Energy consumed by each node Sensor node Energy consumed Transmit 0.00088 Transient 0.012 Sense 0.54 Data logging 0.000035 Receive 0.00349 Upon simulation Sybilsecure takes about 11.327 J to detect a Sybil node. But when considering other social based defense schemes such as Sybilguard and Sybillimit consumes more energy than Sybilsecure. Sybillimit consumes around 8.8 J for a period of time. Sybilguard consumes about 13.48 J for a single round. 5. EXPERIMENTAL RESULTS AND COMPARISONS: Fig 2.Energy consumed to detect Sybil nodes. 0 20 40 60 80 100 120 140 160 180 International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 111 Table 4. Energy consumed by cluster head Cluster head Energy Consumed (J) Transmit 0.00784 Transient 0.049 Sense 0.594 Data logging 0.0000385 Receive 0.00384 Table 5. Energy consumed by each node Sensor node Energy consumed Transmit 0.00088 Transient 0.012 Sense 0.54 Data logging 0.000035 Receive 0.00349 Upon simulation Sybilsecure takes about 11.327 J to detect a Sybil node. But when considering other social based defense schemes such as Sybilguard and Sybillimit consumes more energy than Sybilsecure. Sybillimit consumes around 8.8 J for a period of time. Sybilguard consumes about 13.48 J for a single round. 5. EXPERIMENTAL RESULTS AND COMPARISONS: Fig 2.Energy consumed to detect Sybil nodes. Sybillimit Sybilguard Sybilsecure International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 111 Table 4. Energy consumed by cluster head Cluster head Energy Consumed (J) Transmit 0.00784 Transient 0.049 Sense 0.594 Data logging 0.0000385 Receive 0.00384 Table 5. Energy consumed by each node Sensor node Energy consumed Transmit 0.00088 Transient 0.012 Sense 0.54 Data logging 0.000035 Receive 0.00349 Upon simulation Sybilsecure takes about 11.327 J to detect a Sybil node. But when considering other social based defense schemes such as Sybilguard and Sybillimit consumes more energy than Sybilsecure. Sybillimit consumes around 8.8 J for a period of time. Sybilguard consumes about 13.48 J for a single round. 5. EXPERIMENTAL RESULTS AND COMPARISONS: Fig 2.Energy consumed to detect Sybil nodes.
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 112 Fig 3. Absence of Sybil node Fig 4. Presence of Sybil node 6. CONCLUSION: In this paper, Sybilsecure,an energy efficient algorithm is proposed based on sending and acknowledging the query data packets. Social network based schemes which involved in random
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.4, No.3, May 2014 113 routes of data consumed more energy to detect a Sybil node. But in Sybilsecure , a Sybil node can be detected with less energy and also without decreasing its efficiency. REFERENCES: [1] Bimal Viswanath, Mainack Mondal, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan Mislove, and Ansley Post, “Exploring the design space of social network-based Sybil defenses”, IEEE 2012. [2] Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian , Sherman S.M. Chow ,”Optimal Sybil- resilient node admission control ”,IEEE, 2009. [3] Bimal Viswanath, Ansley Post, Krishna P. Gummadi, Alan Mislove, “An Analysis of Social Network-Based Sybil Defenses”, SIGCOMM’10. [4] H. Yu, M. Kaminsky, P. B. Gibbons and A.Flaxman. “Sybilguard: defending against sybil attacks via social networks”, SIGCOMM 06. [5] H. Yu, P. B. Gibbons, M. Kaminsky, and F.Xiao “Sybillimit: A near-optimal social network defense against sybilattacks” In IEEE Symposium on Security and Privacy, 2008. [6] H. Yu, “Sybil defenses via social networks: a tutorial and survey, ACM SIGACT News, 2011. [7] G. Danezis, P. Mittal, “SybilInfer: Detecting Sybil nodes using social networks”,in Proc. of ISOC NDSS, 2009. [8] F. Li, P. Mittal, M. Caesar, N. Borisov, “SybilControl: practical Sybil defense with computational puzzles”, 7th ACM workshop on Scalable trusted computing, 2012. [9] C. Lesniewski-Lass, M. F. Kaashoek, “Whanau: A sybil-proof distributed hash table”, 7th USENIX Symposium on Network Design and Implementation, 2010. [10] Wei Wei, Fengyuan Xu, “SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks”, Parallel and Distributed Systems, IEEE, 2013. [11] Nitish Balachandran, Sugata Sanyal,”A Review of Techniques to Mitigate Sybil Attacks”, International Journal of Advanced Networking and Applications, 2012. [12] J. R. Douceur, “The Sybil attack”, In Proceedings for the First International Workshop on Peer-to- Peer Systems (IPTPS’02), ser. LNCS, vol. 2429. Cambridge, MA, USA: Springer, Mar. 2002, pp. 251–260. [13] B. N. Levine, C. Shields, and N. B. Margolin, “A survey of solutions to the Sybil attack”, University of Massachusetts Amherst, Amherst, MA, 2006. [14] J. Newsome, E. Shi, D. Song, and A. Perrig. “The Sybil attack in sensor networks: analysis & defences”, In Proceedings of the hird international symposium on Information processing in sensor networks, pages 259–268, 2004. [15] W. Du, J. Deng, Y. S. Han, and P. K. Varshney,” A pairwise key pre-distribution scheme for wireless sensor networks”. In ACM CCS 2003, pages 42–51, Oct. 2003 [16] Murat Demirbas, Youngwhan Song, “An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks, In Proceedings of WoWMoM 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2006. 5 pp. – 570. [17] M. N. Halgamuge, M. Zukerman, and K. Ramamohanarao, H. L. Vu , “An Estimation Of Sensor Energy Consumption”, Progress In Electromagnetics Research B, Vol. 12, 259–295, 2009.