{"title":"分析随机部署无线传感器网络中的间接Sybil攻击","authors":"P. Sarigiannidis, E. Karapistoli, A. Economides","doi":"10.1109/PIMRC.2016.7794866","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.","PeriodicalId":137845,"journal":{"name":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks\",\"authors\":\"P. Sarigiannidis, E. Karapistoli, A. Economides\",\"doi\":\"10.1109/PIMRC.2016.7794866\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.\",\"PeriodicalId\":137845,\"journal\":{\"name\":\"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PIMRC.2016.7794866\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PIMRC.2016.7794866","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysing indirect Sybil attacks in randomly deployed Wireless Sensor Networks
Wireless Sensor Networks (WSNs) have been established as a valuable tool in a wide variety of applications, systems and paradigms. Many application, such as surveillance of a military region, entail unattended operation, where sensor nodes are randomly deployed in an area, known as sensor area. Such a sensor network may be vulnerable to several harmful threats such as wormhole, blackhole, selective forwarding, hello flood, and Sybil attack. One of the most complicated threat is the Sybil attack, where one or more malicious nodes illegitimately declare multiple identities. Additionally, the attack could be even more arduous, if the malicious node(s) declare that the Sybil nodes are directly connected to them. The so-called indirect Sybil attack is the main focus of this study. A performance analysis is devised, where the expected potential number of indirect Sybil nodes in randomly deployed WSNs is computed. Moreover, the probability of an (indirect) Sybil-free sensor network is calculated subject to the number of sensor nodes and the sensor area intensity. The analysis is thoroughly validated by simulation results.