Sybil Solutions

Embed Size (px)

Citation preview

  • 8/12/2019 Sybil Solutions

    1/1

    Solutions to Node Replication Attacks in Wireless

    Sensor Networks: A Road Map

    P. Raghu Vamsi and Krishna KantDepartment of Computer Science and Engineering

    Jaypee Institute of Information Technology, Noida, India.

    [email protected], [email protected]

    AbstractLimitations of sensor nodes such as lack of tamperproof bodies, deployment in hostile and remote environments,resource constraint nature, etc., made Wireless Sensor Networks(WSNs) prone to a diversity of security attacks. Among thepotential attacks, Sybil attack is a severe security threat in whicha malicious node attempts to misrepresent its identity, positiondata and secret key material to disrupt or gain control over thenetwork activities. To mitigate this attack, numerous researchershave proposed a wide variety of solutions. In this paper, theauthors provide a discussion on the state-of-the-art solutionsto Sybil attacks. The goal of this paper is to study the latestdevelopments and to provide a road map for further research.

    KeywordsSybil attack, Security attacks, Sensor nodes, Wirelesssensor networks.

    I. INTRODUCTION

    A Wireless Sensor Network (WSN) consists of tiny andlow-cost Sensor Nodes (SNs) that are often deployed in aremote and hostile environments to monitor or sense an objector process of interest []. Basically, SNs are built without tamperproof bodies to reduce commercial cost. In addition, they areresource constrained and uses broadcast as communication

    pattern. Due to such peculiar characteristics, it is an easyundertaking to an adversary to change over a legitimate nodeinto a malicious node by capturing and loading malicious codeinto nodes chip. It is represented in [] that an adversary cancapture and tamper a SN using some advanced tools withinone minute. These tampered nodes exhibit deviated behaviorfrom regular network operations which can lead to securityattacks. Among the possible potential attacks, Sybil attacks isa severe threat in which a compromised node misrepresentnode identity, location information, secrete key material todisrupt or gain control over the network activities. In addition,such tampered nodes can launch security threats like sinkhole attack, black hole attack, on-off attack, selfish behaviorattack, Grey hole attack, packet modification attacks and can

    launch Denial-of-Service (DoS) attack by jamming the signals.Furthermore, a compromised node can create a wormholeby combining with another powerful compromised node ina network []. However, node capture and tamper is the entrypoint to all such security attacks. Due to the inclemency of theproblem, identifying and proposing solutions to detect Sybilattacks become an imperative research paradigm in the WSNssecurity.