
Identity based Scheme A gainst Sybil Attacks in Wireless Sensor Networks
Author(s) -
V. Sujatha*,
E. A. Mary Anita
Publication year - 2019
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.a3066.109119
Subject(s) - sybil attack , scheme (mathematics) , computer science , wireless sensor network , computer network , computer security , wireless , identity (music) , telecommunications , mathematical analysis , physics , mathematics , acoustics
Wireless sensor networks are insecure against various security attacks. One such harmful, yet easy to promote an attack is the sybil attack which creates multiple identities to achieve access to the wireless sensor networks. A new identity based scheme to provide security against Sybil attacks is proposed in this paper. It detects as well as broadcast information about the attackers to all the nearby sensor nodes. Expensive MapToPoint and pairing operations are not used in this scheme to reduce overheads. It also provides other essential security features. Aggregate-verification to verify several messages at the same time is also proposed in this paper. The performance of the proposed scheme is compared with other recent schemes and the results show that the proposed scheme has reduced amount of overheads and better performance.