{"title":"基于移动代理的分布式无线传感器网络Sybil攻击检测方法","authors":"Sepide Moradi, M. Alavi","doi":"10.1109/IKT.2016.7777753","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks are being used more and more. Sensor nodes can be distributed in hazardous environments to collect data. As these environments are usually unsecured, provide security in wireless sensor networks is vital. Detecting attacks in sensor networks is inevitable to provide security. Various attacks threaten sensor networks one of which is Sybil attack, which can be a big threat for geographical routing protocols and multi-path routing. In this paper, a distributed method has been presented using mobile agents and local information of each sensor to detect Sybil attack. The results of simulation show the efficacy of this method in comparison with previous methods.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks\",\"authors\":\"Sepide Moradi, M. Alavi\",\"doi\":\"10.1109/IKT.2016.7777753\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks are being used more and more. Sensor nodes can be distributed in hazardous environments to collect data. As these environments are usually unsecured, provide security in wireless sensor networks is vital. Detecting attacks in sensor networks is inevitable to provide security. Various attacks threaten sensor networks one of which is Sybil attack, which can be a big threat for geographical routing protocols and multi-path routing. In this paper, a distributed method has been presented using mobile agents and local information of each sensor to detect Sybil attack. The results of simulation show the efficacy of this method in comparison with previous methods.\",\"PeriodicalId\":205496,\"journal\":{\"name\":\"2016 Eighth International Conference on Information and Knowledge Technology (IKT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Eighth International Conference on Information and Knowledge Technology (IKT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IKT.2016.7777753\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IKT.2016.7777753","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks
Wireless sensor networks are being used more and more. Sensor nodes can be distributed in hazardous environments to collect data. As these environments are usually unsecured, provide security in wireless sensor networks is vital. Detecting attacks in sensor networks is inevitable to provide security. Various attacks threaten sensor networks one of which is Sybil attack, which can be a big threat for geographical routing protocols and multi-path routing. In this paper, a distributed method has been presented using mobile agents and local information of each sensor to detect Sybil attack. The results of simulation show the efficacy of this method in comparison with previous methods.