The Evolutionary Game-Based Dynamics of Sybil Attack Prevention in WSN

Document Type : Research Paper

Authors

1 Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran

2 Department of Mathematics and Computer Science, Shahed University, Tehran, Iran

3 Department of Mathematics and Computer Science, Shahid University, Tehran, Iran

Abstract

Today, wireless sensor networks are widely employed in various applications, including monitoring environments and tracking objects for military surveillance, industrial applications, and healthcare. Thus, the establishment of security in such networks is of great importance. One of the dangerous attacks against these networks is the Sybil attack. In this attack, a malicious node propagates multiple fake identities simultaneously, which affects routing protocols and many other operations like voting, reputation evaluation, and data aggregation. In this paper, we study the sensor node rate trust decision to defend against Sybil attacks in WSNs and its dynamics that play a key role in stabilizing the whole WSN using evolutionary game theory. We then propose and prove the theorems indicating that evolutionarily stable strategies can be attained under different parameter values, which supply the theoretical foundations to devise defiance against Sybil attacks in WSNs. Moreover, we can find out the conditions that will lead SNs to choose the strategy Healthy as their final behavior. In this manner, we can assure WSNs’ security and stability by introducing a rate-trust mechanism to satisfy these conditions. And furthermore, the efficiency of algorithms in terms of true detection rate and false detection rate is evaluated through a series of experiments. Experiment results show that the proposed algorithm is able to detect 99.9% of Sybil nodes with a 0.005% false detection rate. Additionally, the proposed algorithm is compared with other algorithms in terms of true detection rate and false detection rate, which shows that the proposed algorithm performs satisfactorily.

Keywords


[1] Muthukumaran, K. Chitra, and C. Selvakumar, "An energy efficient clustering scheme using multilevel routing for wireless sensor network," Computers & Electrical Engineering, vol. 69, pp. 642-652, July 2018 .
[2] E. Ganesh, "Analysis of wireless sensor networks through secure routing protocols using directed diffusion methods," International Journal of Wireless Network Security, vol. 7, no. 1, pp. 28-35, Aug.  2022.
[3] Shafiei, A. Khonsari, H. Derakhshi, and  P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks," Journal of computer and system sciences, vol. 80, no. 3, pp. 644-653, May 2014.
[4] Sinde, F. Begum, K. Njau, and S. Kaijage, "Refining network lifetime of wireless sensor network using energy-efficient clustering and DRL-based sleep scheduling," Sensors, vol. 20, no. 5, p. 1540, Aug. 2020.
[5] Masaeli, H. Haj Seyyed Javadi, and S.H. Erfani, "Survey of Effective of Combinatorial Design Schemes in Wireless Sensor Networks Security‏," Journal of Communication Engineering, vol. 9, no. 2, pp. 271-282, Apr. 2020.
[6] Yi, W. Fang, W. Zhang, W. Gao, and B. Li, "Game-based trust in complex networks: Past, Present, and Future," Complexity, vol. 2021, pp. 1-7, Aug. 2021.
[7]   Khan and K. Singh, "DTMS: A Dual Trust-based Multi-level Sybil Attack Detection Approach in WSNs," DOI:10.21203/rs.3.rs-2566539/v1, March 2023.
[8] Sadeghizadeh and O.R. Marouzi, "Securing cluster-heads in wireless sensor networks by a hybrid intrusion detection system based on data mining‏," Journal of Communication Engineering, vol. 8, 1, pp. 1-19, Mar. 2019.
[9] Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, "Security and trust management in opportunistic networks: a survey," Security and Communication Networks, vol. 8, no. 9, pp. 1812-1827, June 2015.
[10] R. Douceur, "The Sybil attack," First international workshop on peer-to-peer systems (IPTPS ‘02)., pp. 251-260, 2002.
[11] Karlof and D. Wagner,  "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315,  Sept. 2003.
[12] Chen, G. Yang, S. Chen, "A security routing mechanism against sybil attack for wireless sensor networks," In 2010 International Conference on Communications and Mobile Computing,, pp. 142-146, April 2010,
[13] F. Ssu, W.T. Wang, and W.C. Chang, "Detecting Sybil attacks in Wireless Sensor Networks using neighboring information. " Computer Networks, vol. 53, no. 18, pp. 3042-3056, Aug. 2009.
[14] Misra and S. Myneni, "On identifying power control performing sybil nodes in wireless sensor networks using RSSI," In 2010 IEEE Global Telecommunications Conference GLOBECOM 2, pp. 1-5, Dec. 2010.
[15] Li, P. Mittal, M. Caesar, and N. Borisov, "Sybil control: Practical Sybil defense with computational puzzles," In Seventh ACM workshop on Scalable trusted computing, p. 67–68, July2012 .
[16] R. Almas, K. Faez, F. Eshghi, and M. Kelarestaghi, "A new lightweight watchdog-based algorithm for detecting Sybil nodes in mobile WSNs," Future Internet, vol. 10, no.1, p. 1–17, 2017.
[17] S.R.K. Dhamodharan and R. Vayanaperumal, "Detecting and preventing Sybil attacks in wireless sensor networks using message authentication and passing method," The Scientifc World Journal, vol.2015,  Article ID 841267, May 2015.
[18] Sinha, A. Paul, and S. Pal, "Use of spline curve in Sybil attack detection based on received signal power-new approach," International Journal on Recent Trends in Engineering & Technology, vol. 11, no. 1, p. 602, Apr. 2014.
[19] Rafeh and M. Khodadadi, "Detecting Sybil nodes in wireless sensor networks using twohop messages," Indian Journal of Science and Technology, vol. 7, no.9, pp. 1359–1368, Aug. 2014.
[20] Jamshidi, M. Ranjbari, M. Esnaashari, N.N.  Qader, and M.R. Meybodi, "Sybil node detection in mobile wireless sensor networks using observer nodes," International Journal on Informatics Visualization, vol. 2, no. 3, pp. 159–165, June 2018.
[21] Jamshidi, E. Zangeneh, M. Esnaashari, and M.R. Meybodi, "A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks.," Computers & Electrical Engineering, vol. 64, p. 220–232, Mar. 2017.
[22] Han, J. Jiang, L. Shu, J. Niu, and H.C. Chao, "Management and applications of trust in Wireless Sensor Networks: A survey," Journal of Computer and System Sciences, vol. 80, no. 3,  pp. 602-617, Apr. 2014.
[23]  M. Jamshidi, E. Zangeneh, M. Esnaashari, A.M. Darwesh, and M.R. Meybodi, "A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it," Wireless Personal Communications, vol. 105, pp. 145-17, May 2019.