Loading

Identity-based Scheme Against Sybil Attacks in Wireless Sensor Networks
V. Sujatha1, E.A. Mary Anita2

1V. Sujatha, AMET University, Chennai, Tamilnadu, India.
2E.A. Mary Anita, Professor, Department of IT , S.A. Engineering College, Chennai, Tamilnadu, India.
Manuscript received on September 13, 2019. | Revised Manuscript received on October 20, 2019. | Manuscript published on October 30, 2019. | PP: 5350-5355 | Volume-9 Issue-1, October 2019 | Retrieval Number: A3066109119/2019©BEIESP | DOI: 10.35940/ijeat.A1347.109119
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless sensor networks are insecure against various security attacks. One such harmful, yet easy to promote an attack is the sybil attack which creates multiple identities to achieve access to the wireless sensor networks. A new identity based scheme to provide security against Sybil attacks is proposed in this paper. It detects as well as broadcast information about the attackers to all the nearby sensor nodes. Expensive Map To Point and pairing operations are not used in this scheme to reduce overheads. It also provides other essential security features. Aggregate-verification to verify several messages at the same time is also proposed in this paper. The performance of the proposed scheme is compared with other recent schemes and the results show that the proposed scheme has reduced amount of overheads and better performance.
Keywords: AODV, Black Hole Attack, Hash Function, Security, VANET.