A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks

Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required to solve. In this paper, we propose a security mechanism based on LEACH routing protocol against Sybil attack. The mechanism is set to start...

Full description

Saved in:
Bibliographic Details
Published in2010 International Conference on Communications and Mobile Computing Vol. 1; pp. 142 - 146
Main Authors Shanshan Chen, Geng Yang, Shengshou Chen
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2010
Subjects
Online AccessGet full text
ISBN9781424463275
1424463270
DOI10.1109/CMC.2010.265

Cover

Abstract Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required to solve. In this paper, we propose a security mechanism based on LEACH routing protocol against Sybil attack. The mechanism is set to start up Sybil attack detection policy based on RSSI (Received signal strength indicator) when the cluster-heads number in WSN is over a threshold. We analyze mechanism performance of security and energy consumption through a series of experiments. As a result, it shows that the mechanism is effective and robust for resisting Sybil attack.
AbstractList Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required to solve. In this paper, we propose a security mechanism based on LEACH routing protocol against Sybil attack. The mechanism is set to start up Sybil attack detection policy based on RSSI (Received signal strength indicator) when the cluster-heads number in WSN is over a threshold. We analyze mechanism performance of security and energy consumption through a series of experiments. As a result, it shows that the mechanism is effective and robust for resisting Sybil attack.
Author Geng Yang
Shengshou Chen
Shanshan Chen
Author_xml – sequence: 1
  surname: Shanshan Chen
  fullname: Shanshan Chen
  email: moist_css@163.com
  organization: Coll. of Overseas Educ., Nanjing Univ. of Posts & Telecommun., Nanjing, China
– sequence: 2
  surname: Geng Yang
  fullname: Geng Yang
  organization: Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China
– sequence: 3
  surname: Shengshou Chen
  fullname: Shengshou Chen
  organization: Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China
BookMark eNpVjkFLwzAYhiM60M3evHnJH-hMviZNcyxFp7BNcAOPI02-zriulSZD9u8t6MX38vIcnpd3Sq66vkNC7jibc870Q7Wq5sBGglxekESrggsQIs-ggMt_rOSETIExrUWmc3lNkhA-2RghATJ5Q9Yl3aA9DT6e6Vt_ir7b0xXaD9P5cKTl3vguRLo5176lZYzGHmjTD_TdD9hiCKPchZHXGL_74RBuyaQxbcDkr2dk-_S4rZ7T5evipSqXqdcspq4Bzl3tCuFYodAW2lmnjZJ2PFYA2tpI3jBnGmRQcwWNZTrXmQUjDDM8m5H731mPiLuvwR_NcN5JobjQKvsBPXRTKg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CMC.2010.265
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424463282
1424463289
EndPage 146
ExternalDocumentID 5471497
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-df211dbd84d087ec89dcd9a75c00482ecba51f0dafe02b172fc09693c2a4a0a13
IEDL.DBID RIE
ISBN 9781424463275
1424463270
IngestDate Wed Aug 27 02:24:45 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009943965
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-df211dbd84d087ec89dcd9a75c00482ecba51f0dafe02b172fc09693c2a4a0a13
PageCount 5
ParticipantIDs ieee_primary_5471497
PublicationCentury 2000
PublicationDate 2010-April
PublicationDateYYYYMMDD 2010-04-01
PublicationDate_xml – month: 04
  year: 2010
  text: 2010-April
PublicationDecade 2010
PublicationTitle 2010 International Conference on Communications and Mobile Computing
PublicationTitleAbbrev cmc
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000452235
Score 1.5104641
Snippet Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required...
SourceID ieee
SourceType Publisher
StartPage 142
SubjectTerms Batteries
Broadcasting
Costs
Data security
Educational institutions
Energy consumption
Intrusion detection
Mobile communication
Routing protocols
RSSI
security mechanism
Wireless Sensor Network
Wireless sensor networks
Title A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks
URI https://ieeexplore.ieee.org/document/5471497
Volume 1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA_bTp5UNvGbHDyarctH0xzHcAyhQ9iE3UY-pWx24rqD_vUmbVdFPHhLUgohIXnv5f1-vwfAnSQEC4YlckY75OMNjCRlCdLCaB4Sa0mpzp_O4ukzfVyyZQvcN1wYa20JPrP90Cxz-War9-GpbMD8TUoFb4M2T-KKq9W8p5TS4IQduFsxwbyRdKr7rAG-i8E4HVe4LhzMyo_CKqVdmRyD9DCjCk6y7u8L1defv8Qa_zvlE9D7ZvDBp8Y2nYKWzbtgNoLzulwdDEgg_wWmNlB_s90rHL3IzPuKcP6hsg0cFYXUa-hdWhgAsht_Ifqf853vzyrk-K4HFpOHxXiK6noKKBNRgYzzwZ5RJqEmSrjVid8OIyRnOhxjbLWSbOgiI52NsPKOjdM-vhFEY0llJIfkDHTybW7PAaTWWMISMjTGB2hKKE0FEdRxoUOeMr4A3bAUq7dKMWNVr8Ll38NX4KjKyQc8zDXoFO97e-NNfaFuyz3-AmbxpXM
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPOhJDRi_7cGjg9EPth4JkaCyxQRMuJF-zRBwGBkH_etttzGN8eCt7bKkadO-9_p-v98DuBGEYM6w8BKtEs_GG9gTlIWe4loFLrEW5ur8UdwdPtOHKZvW4LbiwhhjcvCZablmnsvXK7VxT2VtZm9SyoMd2GWUUlawtaoXlVwcnLAte6tLcFCJOpV9VkHfebsf9QtkF3aG5UdpldyyDA4g2s6pAJQsWptMttTnL7nG_076EJrfHD70VFmnI6iZtAFxD43LgnXIYYHsFxQZR_6dr19R70XMrbeIxh9yvkS9LBNqgaxTixxEdmmvRPtzurb9uMCOr5swGdxN-kOvrKjgzbmfeTqx4Z6WOqTaDwOjQrshmouAKXeQsVFSsE7ia5EYH0vr2iTKRjicKCyo8EWHHEM9XaXmBBA12hAWko7WNkSTXCrKCadJwJXLVHZPoeGWYvZWaGbMylU4-3v4GvaGk2g0G93Hj-ewX2ToHTrmAurZ-8ZcWsOfyat8v78ARU2owA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Communications+and+Mobile+Computing&rft.atitle=A+Security+Routing+Mechanism+Against+Sybil+Attack+for+Wireless+Sensor+Networks&rft.au=Shanshan+Chen&rft.au=Geng+Yang&rft.au=Shengshou+Chen&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424463275&rft.volume=1&rft.spage=142&rft.epage=146&rft_id=info:doi/10.1109%2FCMC.2010.265&rft.externalDocID=5471497
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/sc.gif&client=summon&freeimage=true