DocumentCode :
3092540
Title :
The Sybil attack in sensor networks: analysis & defenses
Author :
Newsome, James ; Shi, Elaine ; Song, Dawn ; Perrig, Adrian
Author_Institution :
Carnegie Mellon Univ., Pittsburgh, PA, USA
fYear :
2004
fDate :
26-27 April 2004
Firstpage :
259
Lastpage :
268
Abstract :
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack based on J.R. Douceur (2002), where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively.
Keywords :
security of data; telecommunication security; wireless sensor networks; Sybil attack; ad hoc networks; misbehavior detection; multiple identities; resource allocation; routing; security; wireless sensor networks; Computer security; Intelligent networks; Monitoring; Peer to peer computing; Permission; Protocols; Routing; Taxonomy; Testing; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on
Print_ISBN :
1-58113-846-6
Type :
conf
DOI :
10.1109/IPSN.2004.1307346
Filename :
1307346
Link To Document :
بازگشت