A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks
Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required to solve. In this paper, we propose a security mechanism based on LEACH routing protocol against Sybil attack. The mechanism is set to start...
Saved in:
| Published in | 2010 International Conference on Communications and Mobile Computing Vol. 1; pp. 142 - 146 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.04.2010
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781424463275 1424463270 |
| DOI | 10.1109/CMC.2010.265 |
Cover
| Abstract | Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required to solve. In this paper, we propose a security mechanism based on LEACH routing protocol against Sybil attack. The mechanism is set to start up Sybil attack detection policy based on RSSI (Received signal strength indicator) when the cluster-heads number in WSN is over a threshold. We analyze mechanism performance of security and energy consumption through a series of experiments. As a result, it shows that the mechanism is effective and robust for resisting Sybil attack. |
|---|---|
| AbstractList | Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required to solve. In this paper, we propose a security mechanism based on LEACH routing protocol against Sybil attack. The mechanism is set to start up Sybil attack detection policy based on RSSI (Received signal strength indicator) when the cluster-heads number in WSN is over a threshold. We analyze mechanism performance of security and energy consumption through a series of experiments. As a result, it shows that the mechanism is effective and robust for resisting Sybil attack. |
| Author | Geng Yang Shengshou Chen Shanshan Chen |
| Author_xml | – sequence: 1 surname: Shanshan Chen fullname: Shanshan Chen email: moist_css@163.com organization: Coll. of Overseas Educ., Nanjing Univ. of Posts & Telecommun., Nanjing, China – sequence: 2 surname: Geng Yang fullname: Geng Yang organization: Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China – sequence: 3 surname: Shengshou Chen fullname: Shengshou Chen organization: Coll. of Comput., Nanjing Univ. of Posts & Telecommun., Nanjing, China |
| BookMark | eNpVjkFLwzAYhiM60M3evHnJH-hMviZNcyxFp7BNcAOPI02-zriulSZD9u8t6MX38vIcnpd3Sq66vkNC7jibc870Q7Wq5sBGglxekESrggsQIs-ggMt_rOSETIExrUWmc3lNkhA-2RghATJ5Q9Yl3aA9DT6e6Vt_ir7b0xXaD9P5cKTl3vguRLo5176lZYzGHmjTD_TdD9hiCKPchZHXGL_74RBuyaQxbcDkr2dk-_S4rZ7T5evipSqXqdcspq4Bzl3tCuFYodAW2lmnjZJ2PFYA2tpI3jBnGmRQcwWNZTrXmQUjDDM8m5H731mPiLuvwR_NcN5JobjQKvsBPXRTKg |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CMC.2010.265 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781424463282 1424463289 |
| EndPage | 146 |
| ExternalDocumentID | 5471497 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-df211dbd84d087ec89dcd9a75c00482ecba51f0dafe02b172fc09693c2a4a0a13 |
| IEDL.DBID | RIE |
| ISBN | 9781424463275 1424463270 |
| IngestDate | Wed Aug 27 02:24:45 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009943965 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-df211dbd84d087ec89dcd9a75c00482ecba51f0dafe02b172fc09693c2a4a0a13 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5471497 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-April |
| PublicationDateYYYYMMDD | 2010-04-01 |
| PublicationDate_xml | – month: 04 year: 2010 text: 2010-April |
| PublicationDecade | 2010 |
| PublicationTitle | 2010 International Conference on Communications and Mobile Computing |
| PublicationTitleAbbrev | cmc |
| PublicationYear | 2010 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000452235 |
| Score | 1.5104641 |
| Snippet | Much more attention has been attracted in WSN (Wireless Sensor Network) recently. The problems of low energy consumption and high security of WSN are required... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 142 |
| SubjectTerms | Batteries Broadcasting Costs Data security Educational institutions Energy consumption Intrusion detection Mobile communication Routing protocols RSSI security mechanism Wireless Sensor Network Wireless sensor networks |
| Title | A Security Routing Mechanism Against Sybil Attack for Wireless Sensor Networks |
| URI | https://ieeexplore.ieee.org/document/5471497 |
| Volume | 1 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA_bTp5UNvGbHDyarctH0xzHcAyhQ9iE3UY-pWx24rqD_vUmbVdFPHhLUgohIXnv5f1-vwfAnSQEC4YlckY75OMNjCRlCdLCaB4Sa0mpzp_O4ukzfVyyZQvcN1wYa20JPrP90Cxz-War9-GpbMD8TUoFb4M2T-KKq9W8p5TS4IQduFsxwbyRdKr7rAG-i8E4HVe4LhzMyo_CKqVdmRyD9DCjCk6y7u8L1defv8Qa_zvlE9D7ZvDBp8Y2nYKWzbtgNoLzulwdDEgg_wWmNlB_s90rHL3IzPuKcP6hsg0cFYXUa-hdWhgAsht_Ifqf853vzyrk-K4HFpOHxXiK6noKKBNRgYzzwZ5RJqEmSrjVid8OIyRnOhxjbLWSbOgiI52NsPKOjdM-vhFEY0llJIfkDHTybW7PAaTWWMISMjTGB2hKKE0FEdRxoUOeMr4A3bAUq7dKMWNVr8Ll38NX4KjKyQc8zDXoFO97e-NNfaFuyz3-AmbxpXM |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BPOhJDRi_7cGjg9EPth4JkaCyxQRMuJF-zRBwGBkH_etttzGN8eCt7bKkadO-9_p-v98DuBGEYM6w8BKtEs_GG9gTlIWe4loFLrEW5ur8UdwdPtOHKZvW4LbiwhhjcvCZablmnsvXK7VxT2VtZm9SyoMd2GWUUlawtaoXlVwcnLAte6tLcFCJOpV9VkHfebsf9QtkF3aG5UdpldyyDA4g2s6pAJQsWptMttTnL7nG_076EJrfHD70VFmnI6iZtAFxD43LgnXIYYHsFxQZR_6dr19R70XMrbeIxh9yvkS9LBNqgaxTixxEdmmvRPtzurb9uMCOr5swGdxN-kOvrKjgzbmfeTqx4Z6WOqTaDwOjQrshmouAKXeQsVFSsE7ia5EYH0vr2iTKRjicKCyo8EWHHEM9XaXmBBA12hAWko7WNkSTXCrKCadJwJXLVHZPoeGWYvZWaGbMylU4-3v4GvaGk2g0G93Hj-ewX2ToHTrmAurZ-8ZcWsOfyat8v78ARU2owA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Communications+and+Mobile+Computing&rft.atitle=A+Security+Routing+Mechanism+Against+Sybil+Attack+for+Wireless+Sensor+Networks&rft.au=Shanshan+Chen&rft.au=Geng+Yang&rft.au=Shengshou+Chen&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424463275&rft.volume=1&rft.spage=142&rft.epage=146&rft_id=info:doi/10.1109%2FCMC.2010.265&rft.externalDocID=5471497 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424463275/sc.gif&client=summon&freeimage=true |