A Mobile Agent based Sybil Attack Detection Algorithm for Wireless Sensor Network

IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication
© 2015 by IJCA Journal
ETCC 2015 - Number 1
Year of Publication: 2015
Kamdeo Prasad
Chandrakant Mallick

Kamdeo Prasad and Chandrakant Mallick. Article: A Mobile Agent based Sybil Attack Detection Algorithm for Wireless Sensor Network. IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication ETCC 2015(1):31-38, September 2015. Full text available. BibTeX

	author = {Kamdeo Prasad and Chandrakant Mallick},
	title = {Article: A Mobile Agent based Sybil Attack Detection Algorithm for Wireless Sensor Network},
	journal = {IJCA Proceedings on International Conference on Emergent Trends in Computing and Communication},
	year = {2015},
	volume = {ETCC 2015},
	number = {1},
	pages = {31-38},
	month = {September},
	note = {Full text available}


In the recent years it has been a great challenge for the researchers to ensure security in Wireless Sensor Network (WSN). The traditional prevention based cryptographic algorithms cannot meet the security goals in a resource constrained wireless sensor network; these cannot also prevent the insider attacks. So a second line of defense called intrusion detection systems are developed to detect and alarm on various kinds of insider as well as outsider attacks in Wireless Sensor Networks. WSNs are susceptible to many kinds of attacks because of their open and harsh operating environment. Sybil attack is one of the dangerous attacks in terms of resource usages and poses threats to many security goals. In this paper, an algorithm called Sybil attack Detection Algorithm (SDA) is proposed to detect and prevent the Sybil attack in the WSNs. Our proposed SDA algorithm is dynamic and accurate in detecting the Sybil attack that uses Mobile agent, threshold value, random key pre-distribution & random password generation. We are using random password and threshold value to distinguish and then for the confirmation of a legitimate node and a Sybil node. Moreover our algorithm helps in transmission of data in a more secured way by avoiding the Sybil attacks. We have simulated the proposed algorithm in NS2. We have checked the throughput and packet delivery ratio hence verified the detection performance of SDA in wireless sensor network.


  • D. Rajesh Kumar, R. Sathish, Mitigation of Replication Attack Detection in Clusters through a Mobile Agent in Wireless Sensor Networks, Issue March-April 2013 (IJERA).
  • T. N Manjunatha, M. D Sushma, K. M Shivakumar, Security Concepts and Sybil Attack Detection in Wireless Sensor Networks, Issue March-April 2013 (IJETTCS).
  • Sasmita Pani, Omkar Pattnaik, A survey on secure localization with Intrusion Detection System in WSN, Issue October- 2013 (IJRCCT).
  • Deepika P Vinchurkar, Alpa Reshamwala, A Review of Intrusion Detection System Using Neural Network and Machine Learning Technique, Issue November 2012(IJESIT).
  • Gisung Kim, Seungmin Lee , Sehun Kim,"A novel hybrid intrusion detection method integrating anomaly detection with misuse detection", Expert Systems with Applications, Elsevier, Pages 1690-1700
  • K. Abirami, B. Santhi, Sybil attack in Wireless Sensor Network, Issue 2 Apr-May 2013(IJET).
  • Yashpal Singh, Kapil Gulati and S Niranjan, Dimension and Issue OF Mobile Agent Technology, Issue September 2012 (IJAIA).
  • Mohamad Eid, Hassan Artail, Ayman Kayssi, and Ali Chehab, Trends in Mobile Agent Applications, Issue 4, November 2005(JRPIT).
  • T. N. Manjunatha, M. D. Sushma, K. M. Shivakumar, Sybil Attack Detection Through On Demand Distance Vector Based Algorithm In Wireless Sensor Networks, Issue June 2013(JIARM).
  • BinZeng and Benyue Chen, SybilACO: Ant colony optimization in defending against Sybil attacks in the wireless Sensor Network, Issue 2010(IEEE).
  • R. Amuthavalli, Dr. R. S. Bhuvaneswaran, Detection And Prevention Of Sybil Attack In Wireless Sensor Network Employing Random Password Comparison Method, Issue September 2014(JTAIT).
  • S. Sharmila and G Umamaheswari, Detection Of Sybil Attack In Mobile Wireless Sensor Networks, Issue Mar-Apr 2012(IJESAT).
  • D. Sheela, V. R. Srividhya, Amrithavarshini and J. Jayashubha, A Mobile Agent Based Security System of Wireless Sensor Networks against Cloning and Sink Hole Attacks, Issues ICCTAI'2012.
  • Rupinder Singh Brar and Harneet Arora, Mobile Agent Security issue in Wireless Sensor Networks, Issue 1, January 2013(IJARCSSE).
  • James Newsome, Elaine Shi, Dawn Song and Adrian Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Issue 27 April 2004(IPSN).
  • Karen Hsu, Man-Kit Leung and Brian Su, Security Analysis on Defenses against Sybil Attacks in Wireless Sensor Networks, Issue 2008(IEEE).
  • Charles P. Pfleeger and Shari Lawrence Pfleeger. Security in computing. Fourth Edition. PHI pvt. ltd. New Delhi. 2008
  • M. Asaka, S. Okazawa and A. Taguchi, A method of tracing intruders by use of mobile agents. proceedings of the 9th annual internetworking conference (INET`99), San Jose, California (1999).
  • Eschenauer and V. D. Gligor. A key management scheme for distributed sensor networks. In 9th ACM conference on Computer and communications security, pages 41–47, 2002.
  • Dongjin Son, Bhaskar Krishnamachari and John Heidemann, Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks. 4-7 Oct. 2004(IEEE).