CFP last date
20 January 2025
Reseach Article

Review on the various Sybil Attack Detection Techniques in Wireless Sensor Network

by Palak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 164 - Number 1
Year of Publication: 2017
Authors: Palak
10.5120/ijca2017913579

Palak . Review on the various Sybil Attack Detection Techniques in Wireless Sensor Network. International Journal of Computer Applications. 164, 1 ( Apr 2017), 40-45. DOI=10.5120/ijca2017913579

@article{ 10.5120/ijca2017913579,
author = { Palak },
title = { Review on the various Sybil Attack Detection Techniques in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 164 },
number = { 1 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 40-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume164/number1/27451-2017913579/ },
doi = { 10.5120/ijca2017913579 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:10:06.676349+05:30
%A Palak
%T Review on the various Sybil Attack Detection Techniques in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 164
%N 1
%P 40-45
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The paper signifies that the advancement with Wireless Sensor System (WSNs) have attracted lots of consideration in an area as well as in the learning community. Wireless networking technologies boast several attributes like self-organization, all round flexibility, risk-free transmission as well as future notification. Security is now a significant cover for various mission-critical applications in WSNs. This paper has been focused on that how to shield against a serious attack, the Sybil attack. It has additionally done the comparison of many Sybil attack recognition technique predicated on various guidelines which screen and well-timed detects Sybil attacks in large-scale WSNs. Also another comparison has been done on the basis of the parameters used in each technique.

References
  1. Panagiotis Sarigiannidis, Eirini Karapistoli, Anastasios A. Economides, “Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information” , Elsevier, June 2015.
  2. Manju V C “Sybil attack prevention in Wireless Sensor Network”, IJCNWMC 2014.
  3. N. M. Saravana Kumar, S. Deepa, C. N. Marimuthu, T. Eswari, S. Lavanya “Signature Based Vulnerability Detection Over Wireless Sensor Network for Reliable Data Transmission”, Springer 2014.
  4. P. Raghu Vamsi and Krishna Kant “Detecting Sybil Attacks in Wireless Sensor Networks using Sequential Analysis”, International Journal on Smart Sensing and Intelligent System, Vol. 9, No. 2, 2015.
  5. Noor Alsaedi, Fazirulhisyam Hashim, A. Sali “Energy Trust System for Detecting Sybil Attack in Clustered Wireless Sensor Networks” , IEEE 2015.
  6. P. Raghu Vamsi, Krishna Kant “A Light-weight Sybil Attack Detection Framework for Wireless Sensor Networks”, IEEE 2014.
  7. P. Raghu Vamsi, Krishna Kant “Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks”, ICSPCT 2014.
  8. R. Amuthavalli, DR. R. S. Bhuvaneshwaran “Detection and Prevention of Sybil Attack in WSN Employing Random Password Comparison Method”, JATIT 2014, Vol. 67 No.1.
  9. Wei Shi, Sanyang Liu and Zhaohui Zhang “A Light-weight Detection Mechanism against Sybil Attack in Wireless Sensor Network”, KSII Transactions of Internet ad Information Systems VOL. 9, NO. 9, September 2015.
  10. Imran Makhdoom, Mehreen Afzal, Imran Rashid “A Novel Code Attestation Scheme against Sybil Attack in Wireless Sensor Networks”, IEEE 2014.
  11. T.G. Dhanalakshmi, Dr.N.Bharathi, M.Monisha “Safety concerns of Sybil attack in WSN”, IEEE 2014.
  12. Rupinder Singh, Jatinder Singh, Ravinder Singh “TBSD: A Defend Against Sybil Attack in Wireless Sensor Networks”, IJCSNS 2016.
  13. Reza Rafeh and Mozhgan Khodadadi “Detecting Sybil Nodes in Wireless Sensor Networks using Two-hop Messages”, Indian Journal of Science and Technology, Vol 7(9), 1359–1368, September 2014.
  14. Priyanka Rawat, Kamal Deep Singh, Hakima Chaouchi, Jean Marie Bonnin “Wireless sensor networks: a survey on recent developments and potential synergies”, Springer 2013.”
  15. Udaya Suriya Raj Kumar Dhamodharan, Rajamani Vayanaperumal “Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method”, Volume 2015, Article ID 841267, Scientific World Journal, 2015.
  16. V. Sujatha, E.A. Mary Anita “Detection of Sybil Attack in Wireless Sensor Network”, IDOSI 2015
  17. Priyanka Rawat, Kamal Deep Singh, Hakima Chaouchi, Jean Marie Bonnin “Wireless sensor networks: a survey on recent developments and potential synergies”, Springer 2013.
  18. Rupinder Singh, Dr. Jatinder Singh, Dr. Ravinder Singh “Sybil Attack countermeasures in wireless sensor”, IJCNWC, ISSN: 2250-3501 Vol.6, No 3, May - June 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network Security Sybil attack detection techniques and Parameters.