Cargando…

A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data t...

Descripción completa

Detalles Bibliográficos
Autores principales: Arshad, Akashah, Mohd Hanapi, Zurina, Subramaniam, Shamala, Latip, Rohaya
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8507477/
https://www.ncbi.nlm.nih.gov/pubmed/34712787
http://dx.doi.org/10.7717/peerj-cs.673
_version_ 1784581864941420544
author Arshad, Akashah
Mohd Hanapi, Zurina
Subramaniam, Shamala
Latip, Rohaya
author_facet Arshad, Akashah
Mohd Hanapi, Zurina
Subramaniam, Shamala
Latip, Rohaya
author_sort Arshad, Akashah
collection PubMed
description Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemented in the routing protocol. In a Sybil attack, an adversary illegally advertises several false identities or a single identity that may occur at several locations called Sybil nodes. Therefore, in this paper, we give a survey of the most up-to-date assured methods to defend from the Sybil attack. The Sybil attack countermeasures includes encryption, trust, received signal indicator (RSSI), encryption and artificial intelligence. Specifically, we survey different methods, along with their advantages and disadvantages, to mitigate the Sybil attack. We discussed the lesson learned and the future avenues of study and open issues in WSN security analysis.
format Online
Article
Text
id pubmed-8507477
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-85074772021-10-27 A survey of Sybil attack countermeasures in IoT-based wireless sensor networks Arshad, Akashah Mohd Hanapi, Zurina Subramaniam, Shamala Latip, Rohaya PeerJ Comput Sci Computer Networks and Communications Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemented in the routing protocol. In a Sybil attack, an adversary illegally advertises several false identities or a single identity that may occur at several locations called Sybil nodes. Therefore, in this paper, we give a survey of the most up-to-date assured methods to defend from the Sybil attack. The Sybil attack countermeasures includes encryption, trust, received signal indicator (RSSI), encryption and artificial intelligence. Specifically, we survey different methods, along with their advantages and disadvantages, to mitigate the Sybil attack. We discussed the lesson learned and the future avenues of study and open issues in WSN security analysis. PeerJ Inc. 2021-09-22 /pmc/articles/PMC8507477/ /pubmed/34712787 http://dx.doi.org/10.7717/peerj-cs.673 Text en ©2021 Arshad et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Computer Networks and Communications
Arshad, Akashah
Mohd Hanapi, Zurina
Subramaniam, Shamala
Latip, Rohaya
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_full A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_fullStr A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_full_unstemmed A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_short A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_sort survey of sybil attack countermeasures in iot-based wireless sensor networks
topic Computer Networks and Communications
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8507477/
https://www.ncbi.nlm.nih.gov/pubmed/34712787
http://dx.doi.org/10.7717/peerj-cs.673
work_keys_str_mv AT arshadakashah asurveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks
AT mohdhanapizurina asurveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks
AT subramaniamshamala asurveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks
AT latiprohaya asurveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks
AT arshadakashah surveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks
AT mohdhanapizurina surveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks
AT subramaniamshamala surveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks
AT latiprohaya surveyofsybilattackcountermeasuresiniotbasedwirelesssensornetworks