Skip to main content
Author(s):
Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu
Year Published:

Cataloging Information

Topic(s):
Fuels Inventory & Monitoring
Fuels

NRFSN number: 17268
FRAMES RCS number: 25391
Record updated:

Wireless Sensor Networks (WSNs) have experienced phenomenal growth over the past decade. They are typically deployed in human-inaccessible terrains to monitor and collect time-critical and delay-sensitive events. There have been several studies on the use of WSN in different applications. All such studies have mainly focused on Quality of Service (QoS) parameters such as delay, loss, jitter, etc. of the sensed data. Security provisioning is also an important and challenging task lacking in all previous studies. In this paper, we propose a Sybil attack detection scheme for a cluster-based hierarchical network mainly deployed to monitor forest wildfire. We propose a two-tier detection scheme. Initially, Sybil nodes and their forged identities are detected by high-energy nodes. However, if one or more identities of a Sybil node sneak through the detection process, they are ultimately detected by the two base stations. After Sybil attack detection, an optimal percentage of cluster heads are elected and each one is informed using nomination packets. Each nomination packet contains the identity of an elected cluster head and an end user’s specific query for data collection within a cluster. These queries are user-centric, on-demand and adaptive to an end user requirement. The undetected identities of Sybil nodes reside in one or more clusters. Their goal is to transmit high false-negative alerts to an end user for diverting attention to those geographical regions which are less vulnerable to a wildfire. Our proposed approach has better network lifetime due to efficient sleep–awake scheduling, higher detection rate and low false-negative rate.

Citation

Jan, Mian Ahmad; Nanda, Priyadarsi; He, Xiangjian; Liu, Ren Ping. 2018. A Sybil attack detection scheme for a forest wildfire monitoring application. Future Generation Computer Systems 80:613-626. https://doi.org/10.1016/j.future.2016.05.034

Access this Document