Detecting Sybil attack in mobile wireless sensor networks using observer nodes

Loading...
Thumbnail Image
Supplementary material
Other Title
Authors
Alomirah, Abdulaziz Abdulrahman
Author ORCID Profiles (clickable)
Degree
Master of Computing
Grantor
Unitec Institute of Technology
Date
2019
Supervisors
Sarrafpour, Bahman
Li, Xiaosong
Type
Masters Thesis
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
wireless sensor networks (WSN)
WSN
microelectromechanical systems (MEMS)
MEMS
computer security
Sybil attacks
observer nodes
algorithms
Citation
Alomirah, A. A. (2019). Detecting Sybil attack in mobile wireless sensor networks using observer nodes. An unpublished thesis submitted in partial fulfilment of the requirements for the degree of Master of Computing, Unitec Institute of Technology, Auckland, New Zealand.
Abstract
RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows:  How many observer nodes would be enough for a wireless sensor network to detect the Sybil attack?  How often should an observer node collect information about neighbouring nodes?  What is a suitable threshold for common neighbours to mark a node as suspicious?  How much overhead would the observation algorithm impose on the network? Wireless sensor network (WSN) is one of the dominant technology trends in recent years. These networks are being employed in different environments to gather data for various applications. Mobile wireless sensor network (MWSN) is a subclass of WSN, in which the nodes are mobile and frequently change their locations. Since sensor nodes have limited capabilities, WSNs are vulnerable to various types of attacks, one of which is Sybil attack. In this attack, a malicious node illegitimately forges several (fake) identities. These fake copies confuse and collapse the network. Sybil attack causes too many threats to the routing algorithm, data aggregation, fair resource allocation, voting system, and misbehaviour detection. Since multiple copies of the malicious nodes can be located in several places at the same time, Sybil can disrupt geographic routing protocols and collide with routing algorithms by building many routes from a single node. As a result, detecting and preventing this type of attack is crucial for the security of the wireless sensor network. In this thesis, I propose a new lightweight algorithm for detecting the Sybil attack in MWSN using observer nodes. Observer nodes are normal, trustful nodes which have been initially programmed to observe the network and report malicious behaviours. An observer node counts the number of times a node has appeared as a common neighbour between itself and its neighbours. After collecting some information about its neighbours, each observer node considers the nodes whose counters are above a threshold as critical, and nodes having all critical nodes in their neighbourhood are considered suspicious nodes. The results show that true detection rate of the proposed algorithm is 98.1%, and its false detection rate is 0.5%, while similar algorithms could not achieve better than 95.4% and 1.2% for these metrics, respectively. In addition, the proposed algorithm outperforms other algorithms in terms of overhead and scalability.
Publisher
Link to ePress publication
DOI
Copyright holder
Author
Copyright notice
All rights reserved
Copyright license
Available online at