메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Mojtaba Jamshidi (University of Human Development) Aso Mohammad Darwesh (University of Human Development) Augustyn Lorenc (Cracow University of Technology) Milad Ranjbari (Islamic Azad University) Mohammad Reza Meybodi (Amirkabir University of Technology)
저널정보
대한전자공학회 IEIE Transactions on Smart Processing & Computing IEIE Transactions on Smart Processing & Computing Vol.7 No.6
발행연도
2018.12
수록면
457 - 466 (10page)
DOI
10.5573/IEIESPC.2018.7.6.457

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
A Sybil attack, where a malicious node creates multiple fake or captured identities, is one of the most well-known attacks against wireless sensor networks (WSNs). This attack can leave devastating effects on operational and routing protocols, such as voting, data aggregation, resource allocation, and misbehavior detection. In this paper, a simple and precise algorithm for detecting Sybil attacks in mobile WSNs is proposed. Considering the rapid growth of Internet of Things (IoTs) devices and WSNs’ popularity, the threat from this attack is serious. The main underlying idea of the proposed algorithm is to use neighbors’ information and observer nodes to detect Sybil nodes during the network lifetime. In the proposed algorithm, some observer nodes first walk the network and record necessary information about other nodes. Each observer node then uses this collected information to detect Sybil nodes. The proposed algorithm is compared with other algorithms according to criteria including memory, communication, and computation overhead. Also, the proposed algorithm is implemented with the J-SIM simulator, and its performance is compared in a series of experiments with other algorithms using the criteria of true- and falsedetection rates. The simulation results indicate that the proposed algorithm can detect 100% of the Sybil nodes, so its false-detection rate is 0%, regarding the study assumptions.

목차

Abstract
1. Introduction
2. Related Work
3. System Assumptions, the Attack Model, and symbols
4. The Proposed Algorithm
5. Performance Evaluation and Simulation Results
6. Conclusion
References

참고문헌 (26)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0101-2019-569-000333349