Skip to main content

A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9478))

Included in the following conference series:

  • 1557 Accesses

Abstract

Security is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of Sybil attackĀ [5], where a single entity (node) illegitimately presents multiple identities. As the nodes in sensor networks can be physically captured by an adversary, Sybil attack can manifest in a severe form leading to the malfunction of basic operational protocols. It is also pointed out inĀ [5] that Sybil attack could be prevented if each honest identity possesses an unforgeable certificate issued by a trusted authority. The identity is mandated to produce the certificate as a proof of authenticity before it takes part in any network activity. Since ordinary certification schemes are not suitable for sensor networks due to some typical incompatibility features, we propose a symmetric key based threshold certification scheme specially designed to defend Sybil attack in sensor networks.

Most of this work were done when the authors were with HTSL, Bangalore during 2004 - 2006.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A (t,Ā n) threshold scheme is perfect if the probability of guessing some secret with \((t-1)\) or less number of partial information about the secret is identical to the probability of guessing the secret with no information.

References

  1. Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993ā€“999 (1978)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  2. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612ā€“613 (1979)

    ArticleĀ  MATHĀ  MathSciNetĀ  Google ScholarĀ 

  3. Denning, D., Sacco, G.: Timestamps in key distribution protocols. Commun. ACM 25, 533ā€“536 (1982)

    Google ScholarĀ 

  4. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitious security support for mobile ad-hoc networks. In: Proceedings of International conference on Network Protocols (2001)

    Google ScholarĀ 

  5. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251ā€“260. Springer, Heidelberg (2002)

    ChapterĀ  Google ScholarĀ 

  6. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003

    Google ScholarĀ 

  7. Wang, W., Zhu, Y., Li, B.: Self-managed heterogeneous certification in mobile ad hoc networks. In: Proceedings of IEEE Vehicular Technology Conference (2003)

    Google ScholarĀ 

  8. Khalili, A., Katz, J., Arbaugh, W.: Toward secure key distribution in truly ad-hoc networks. In: Proceedings of the IEEE Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL, 28 January 2003

    Google ScholarĀ 

  9. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis and defenses. In: Proceedings of Third International Symposium on Information Processing in Sensor Networks, April 2004

    Google ScholarĀ 

  10. Zhang, Q., Wang, P., Reeves, D.S., Ning, P.: Defending sybil attacks in sensor networks. In: Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS-2005), June 2005

    Google ScholarĀ 

  11. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15(1), 39ā€“68 (2007)

    ArticleĀ  Google ScholarĀ 

  12. Saxena, N., Yi, J.H.: Non-interactive self-certification for long-lived mobile ad hoc networks. IEEE Trans. Inf. Forensics Secur. (TIFS) 4(4), 946ā€“955 (2009)

    ArticleĀ  Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Debapriyay Mukhopadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Banerjee, S., Mukhopadhyay, D., Roy, S. (2015). A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks. In: Jajoda, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2015. Lecture Notes in Computer Science(), vol 9478. Springer, Cham. https://doi.org/10.1007/978-3-319-26961-0_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26961-0_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26960-3

  • Online ISBN: 978-3-319-26961-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics