2015 IEEE 12th Malaysia International Conference on Communications (MICC) 2015
DOI: 10.1109/micc.2015.7725414
|View full text |Cite
|
Sign up to set email alerts
|

Energy trust system for detecting sybil attack in clustered wireless sensor networks

Abstract: Wireless Sensor Network (WSN) is an emerging technology that offers great promise for various applications. The sensing capabilities combined with relatively small processing power and wireless communication makes it one of the main technologies to be exploited in the future. Despite its attractive features, WSN is vulnerable to various security attacks. The constraints of WSN such as limited energy and memory make the security problem even more critical. One of the security issues of WSN is it is susceptible … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Attackers can also impersonate network nodes by counterfeiting, and conceal legitimate users to execute unauthorized operations. The active attacks include jamming attack [15], denial of service attack, black hole attack [16], tampering attack, wormhole attack [17], selective forwarding, identity replication/cloning attack [18], Sybil attack [19], etc. The passive attack is difficult to detect for the simple reason that the attacker only monitors the transmitted data without modifying the message.…”
Section: Security Threat In Clustered Wireless Sensor Networkmentioning
confidence: 99%
“…Attackers can also impersonate network nodes by counterfeiting, and conceal legitimate users to execute unauthorized operations. The active attacks include jamming attack [15], denial of service attack, black hole attack [16], tampering attack, wormhole attack [17], selective forwarding, identity replication/cloning attack [18], Sybil attack [19], etc. The passive attack is difficult to detect for the simple reason that the attacker only monitors the transmitted data without modifying the message.…”
Section: Security Threat In Clustered Wireless Sensor Networkmentioning
confidence: 99%
“…Noor Alsaedi, et.al presented the issues being faced when a lightweight trust system is generated. In order to address this issue for hierarchical WSN, a metric parameter that utilized energy is proposed [8]. It is seen through the performance evaluations that for the detection of Sybil attacks with respect to true and false positive identifications, the results achieved as highly efficient and scalable.…”
Section: Related Workmentioning
confidence: 99%
“…In addition attacks that are common on dataset are also elaborated through this literature. [3]The attacks on dataset could be on resources, network or data. The attacks on resources causes denial of service and hence extra time is consumed while accessing resources.…”
Section: Introductionmentioning
confidence: 99%