IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • Uluslararası Sürdürülebilir Mühendislik ve Teknoloji Dergisi
  • Volume:7 Issue:1
  • DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS

DETAILED ANALYSIS OF SYBIL ATTACK IN WIRELESS SENSOR NETWORKS

Authors : Abdullah ORMAN, Yunus ÜSTÜN, Murat DENER
Pages : 41-54
View : 27 | Download : 18
Publication Date : 2023-06-29
Article Type : Research Paper
Abstract :Wireless sensor networks often operate in unprotected, unavailable, or adverse conditions. Therefore, the security of wireless sensor networks is of great importance. Some of the most popular attacks among wireless sensor networks are DDOS attack, Sybil attack, Selective Routing attack, Wormhole attack and Blackhole attack. In the literature, there are many definitions of Sybil attack, which can be the most effective attack potential in wireless sensor networks, but most studies do not describe the Sybil attack in detail. They do not give detailed information about the implementation of the Sybil attack in the simulation environment. In a Sybil attack, the malicious node presents itself to neighboring nodes, along with many randomly generated or stolen identities. Unaware of anything, the victim node perceives the packet from the malicious node as if it came from another node with a different identity. By sending fake packets to the network in this way, it can negatively affect network traffic and cause nodes to be unable to exchange packets. In other effects, bogus packets generated by fake identities are collected at the base node, and the continuity and stability of the network can be compromised with phony information instead of accurate information on the network. In this study, the Sybil attack, a dangerous attack in wireless sensor networks, is explained in detail, and a step-by-step Sybil attack is carried out in the NS2 simulation environment. In addition, the application of 9 different scenarios created in the NS2 simulation environment and the effects of the Sybil attack on the system were analyzed. Each scenario was prepared with a different location and number of Sybil and replication nodes. In this way, the effects of the Sybil attack on the system have been observed in many cases. All data obtained by NS2 was used for analysis. As a result of the data, packet delivery speed, throughput, normalized forwarding load and end-to-end latency values were compared.
Keywords : Kablosuz Sensör Ağları, Güvenlik, Sybil saldırıları, nsGTFA

ORIGINAL ARTICLE URL
VIEW PAPER (PDF)

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2025