By Topic

An Approach to Mitigating Sybil Attack in Wireless Networks using ZigBee

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Gunhee Lee ; Sch. of Inf. & Commun., Ajou Univ., Suwon ; Jaesung Lim ; Dong-Kyoo Kim ; SungHyun Yang
more authors

Various sensors employing ZigBee protocol send environment information to a home gateway. The home gateway manages every devices, sensors and services according to the information. However, if an attacker fabricates the information with malevolent purpose, the system may perform any inadvertent service, which may be harmful to users. Sybil attack is one of serious threats that uses such vulnerability. In this paper, we propose a Sybil attack detection method and its response method to mitigate the effect of the attack in wireless network using ZigBee. The proposed method employs a challenge-response approach. A verifier send a node a request that corresponds to an identity, and the receiver should respond the request properly within threshold time. The performance of the proposed method is reasonable for applying it to the practical networks. This will help the wireless networks using ZigBee to enhance its security.

Published in:

Advanced Communication Technology, 2008. ICACT 2008. 10th International Conference on  (Volume:2 )

Date of Conference:

17-20 Feb. 2008