The sybil attack in sensor networks: analysis & defenses

J Newsome, E Shi, D Song, A Perrig - Proceedings of the 3rd …, 2004 - dl.acm.org
J Newsome, E Shi, D Song, A Perrig
Proceedings of the 3rd international symposium on Information processing in …, 2004dl.acm.org
Security is important for many sensor network applications. A particularly harmful attack
against sensor and ad hoc networks is known as the Sybil attack [6], where a node
illegitimately claims multiple identities. This paper systematically analyzes the threat posed
by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be
exceedingly detrimental to many important functions of the sensor network such as routing,
resource allocation, misbehavior detection, etc. We establish a classification of different …
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively.
ACM Digital Library