Research Article

DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS

Volume: 7 Number: 1 June 29, 2023
TR EN

DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS

Abstract

Wireless sensor networks often operate in unprotected, unavailable, or adverse conditions. Therefore, the security of wireless sensor networks is of great importance. Some of the most popular attacks among wireless sensor networks are DDOS attack, Sybil attack, Selective Routing attack, Wormhole attack and Blackhole attack. In the literature, there are many definitions of Sybil attack, which can be the most effective attack potential in wireless sensor networks, but most studies do not describe the Sybil attack in detail. They do not give detailed information about the implementation of the Sybil attack in the simulation environment. In a Sybil attack, the malicious node presents itself to neighboring nodes, along with many randomly generated or stolen identities. Unaware of anything, the victim node perceives the packet from the malicious node as if it came from another node with a different identity. By sending fake packets to the network in this way, it can negatively affect network traffic and cause nodes to be unable to exchange packets. In other effects, bogus packets generated by fake identities are collected at the base node, and the continuity and stability of the network can be compromised with phony information instead of accurate information on the network. In this study, the Sybil attack, a dangerous attack in wireless sensor networks, is explained in detail, and a step-by-step Sybil attack is carried out in the NS2 simulation environment. In addition, the application of 9 different scenarios created in the NS2 simulation environment and the effects of the Sybil attack on the system were analyzed. Each scenario was prepared with a different location and number of Sybil and replication nodes. In this way, the effects of the Sybil attack on the system have been observed in many cases. All data obtained by NS2 was used for analysis. As a result of the data, packet delivery speed, throughput, normalized forwarding load and end-to-end latency values were compared.

Keywords

References

  1. Almesaeed, R., & Al-Salem, E. (2022). Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks. Wireless Networks, 28(4), 1361-1374. https://doi.org/10.1007/s11276-021-02871-0
  2. Angappan, A., Saravanabava, T. P., Sakthivel, P., & Vishvaksenan, K. S. (2020). Novel sybil attack detection using rssi and neighbour information to ensure secure communication in wsn. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6567-6578. https://doi.org/10.1007/s12652-020-02276-5
  3. Ardakani, M. M., Tabarzad, M. A., & Shayegan, M. A. (2022). Detecting sybil attacks in vehicular ad hoc networks using fuzzy logic and arithmetic optimization algorithm. Journal of Supercomputing, 78(14), 16303-16335. https://doi.org/10.1007/s11227-022-04526-z
  4. Avila, K., Sanmartin, P., Jabba, D., & Gomez, J. (2021). An analytical survey of attack scenario parameters on the techniques of attack mitigation in wsn. Wireless Personal Communications, 122(4), 3687-3718. https://doi.org/10.1007/s11277-021-09107-6
  5. Biswas, R. N., Mitra, S. K., & Naskar, M. K. (2022). Localization under node capture attacks using fuzzy based anchor mobility control. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-021-03619-6
  6. Ceyhan, E. B. & Sağıroğlu, Ş. (2013). Kablosuz algılayıcı ağlarda güvenlik sorunları ve alınabilecek önlemler. Politeknik Dergisi , 16, (4), 155-163. https://dergipark.org.tr/tr/pub/politeknik/issue/33068/367995
  7. Chen, S., Pang, Z., Wen, H., Yu, K., Zhang, T., & Lu, Y. (2021). Automated labeling and learning for physical layer authentication against clone node and sybil attacks in industrial wireless edge networks. IEEE Transactions on Industrial Informatics, 17(3), 2041-2051. https://doi.org/10.1109/tii.2020.2963962
  8. Ezhilarasi, M., Gnanaprasanambikai, L., Kousalya, A., & Shanmugapriya, M. (2022). A novel implementation of routing attack detection scheme by using fuzzy and feed-forward neural networks. Soft Computing. https://doi.org/10.1007/s00500-022-06915-1

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

June 29, 2023

Submission Date

May 28, 2023

Acceptance Date

June 25, 2023

Published in Issue

Year 2023 Volume: 7 Number: 1

APA
Orman, A., Üstün, Y., & Dener, M. (2023). DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS. Uluslararası Sürdürülebilir Mühendislik Ve Teknoloji Dergisi, 7(1), 41-54. https://izlik.org/JA42JK67BU
AMA
1.Orman A, Üstün Y, Dener M. DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS. Uluslararası Sürdürülebilir Mühendislik ve Teknoloji Dergisi. 2023;7(1):41-54. https://izlik.org/JA42JK67BU
Chicago
Orman, Abdullah, Yunus Üstün, and Murat Dener. 2023. “DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS”. Uluslararası Sürdürülebilir Mühendislik Ve Teknoloji Dergisi 7 (1): 41-54. https://izlik.org/JA42JK67BU.
EndNote
Orman A, Üstün Y, Dener M (June 1, 2023) DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS. Uluslararası Sürdürülebilir Mühendislik ve Teknoloji Dergisi 7 1 41–54.
IEEE
[1]A. Orman, Y. Üstün, and M. Dener, “DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS”, Uluslararası Sürdürülebilir Mühendislik ve Teknoloji Dergisi, vol. 7, no. 1, pp. 41–54, June 2023, [Online]. Available: https://izlik.org/JA42JK67BU
ISNAD
Orman, Abdullah - Üstün, Yunus - Dener, Murat. “DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS”. Uluslararası Sürdürülebilir Mühendislik ve Teknoloji Dergisi 7/1 (June 1, 2023): 41-54. https://izlik.org/JA42JK67BU.
JAMA
1.Orman A, Üstün Y, Dener M. DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS. Uluslararası Sürdürülebilir Mühendislik ve Teknoloji Dergisi. 2023;7:41–54.
MLA
Orman, Abdullah, et al. “DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS”. Uluslararası Sürdürülebilir Mühendislik Ve Teknoloji Dergisi, vol. 7, no. 1, June 2023, pp. 41-54, https://izlik.org/JA42JK67BU.
Vancouver
1.Abdullah Orman, Yunus Üstün, Murat Dener. DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS. Uluslararası Sürdürülebilir Mühendislik ve Teknoloji Dergisi [Internet]. 2023 Jun. 1;7(1):41-54. Available from: https://izlik.org/JA42JK67BU