Show simple record

dc.contributor.authorAlomirah, Abdulaziz Abdulrahman
dc.description.abstractRESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows:  How many observer nodes would be enough for a wireless sensor network to detect the Sybil attack?  How often should an observer node collect information about neighbouring nodes?  What is a suitable threshold for common neighbours to mark a node as suspicious?  How much overhead would the observation algorithm impose on the network? Wireless sensor network (WSN) is one of the dominant technology trends in recent years. These networks are being employed in different environments to gather data for various applications. Mobile wireless sensor network (MWSN) is a subclass of WSN, in which the nodes are mobile and frequently change their locations. Since sensor nodes have limited capabilities, WSNs are vulnerable to various types of attacks, one of which is Sybil attack. In this attack, a malicious node illegitimately forges several (fake) identities. These fake copies confuse and collapse the network. Sybil attack causes too many threats to the routing algorithm, data aggregation, fair resource allocation, voting system, and misbehaviour detection. Since multiple copies of the malicious nodes can be located in several places at the same time, Sybil can disrupt geographic routing protocols and collide with routing algorithms by building many routes from a single node. As a result, detecting and preventing this type of attack is crucial for the security of the wireless sensor network. In this thesis, I propose a new lightweight algorithm for detecting the Sybil attack in MWSN using observer nodes. Observer nodes are normal, trustful nodes which have been initially programmed to observe the network and report malicious behaviours. An observer node counts the number of times a node has appeared as a common neighbour between itself and its neighbours. After collecting some information about its neighbours, each observer node considers the nodes whose counters are above a threshold as critical, and nodes having all critical nodes in their neighbourhood are considered suspicious nodes. The results show that true detection rate of the proposed algorithm is 98.1%, and its false detection rate is 0.5%, while similar algorithms could not achieve better than 95.4% and 1.2% for these metrics, respectively. In addition, the proposed algorithm outperforms other algorithms in terms of overhead and scalability.en_NZ
dc.subjectwireless sensor networks (WSN)en_NZ
dc.subjectmicroelectromechanical systems (MEMS)en_NZ
dc.subjectcomputer securityen_NZ
dc.subjectSybil attacksen_NZ
dc.subjectobserver nodesen_NZ
dc.titleDetecting Sybil attack in mobile wireless sensor networks using observer nodesen_NZ
dc.typeMasters Thesisen_NZ of Computingen_NZ Institute of Technologyen_NZ
dc.subject.marsden080303 Computer System Securityen_NZ
dc.subject.marsden080503 Networking and Communicationsen_NZ
dc.identifier.bibliographicCitationAlomirah, A. A. (2019). Detecting Sybil attack in mobile wireless sensor networks using observer nodes. An unpublished thesis submitted in partial fulfilment of the requirements for the degree of Master of Computing, Unitec Institute of Technology, Auckland, New Zealand.en_NZ
dc.contributor.affiliationUnitec Institute of Technologyen_NZ
unitec.advisor.principalSarrafpour, Bahman
unitec.advisor.associatedLi, Xiaosong

Files in this item


This item appears in

Show simple record

© Unitec Institute of Technology, Private Bag 92025, Victoria Street West, Auckland 1142