A survey of Sybil attack countermeasures in IoT-based wireless sensor networks

Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data t...

Full description

Bibliographic Details
Main Authors: Arshad, Akashah, Mohd Hanapi, Zurina, Subramaniam, Shamala, Latip, Rohaya
Format: Article
Published: PeerJ 2021
Online Access:http://psasir.upm.edu.my/id/eprint/96125/
_version_ 1848862299634270208
author Arshad, Akashah
Mohd Hanapi, Zurina
Subramaniam, Shamala
Latip, Rohaya
author_facet Arshad, Akashah
Mohd Hanapi, Zurina
Subramaniam, Shamala
Latip, Rohaya
author_sort Arshad, Akashah
building UPM Institutional Repository
collection Online Access
description Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemented in the routing protocol. In a Sybil attack, an adversary illegally advertises several false identities or a single identity that may occur at several locations called Sybil nodes. Therefore, in this paper, we give a survey of the most up-to-date assured methods to defend from the Sybil attack. The Sybil attack countermeasures includes encryption, trust, received signal indicator (RSSI), encryption and artificial intelligence. Specifically, we survey different methods, along with their advantages and disadvantages, to mitigate the Sybil attack. We discussed the lesson learned and the future avenues of study and open issues in WSN security analysis.
first_indexed 2025-11-15T13:14:49Z
format Article
id upm-96125
institution Universiti Putra Malaysia
institution_category Local University
last_indexed 2025-11-15T13:14:49Z
publishDate 2021
publisher PeerJ
recordtype eprints
repository_type Digital Repository
spelling upm-961252023-02-21T02:05:38Z http://psasir.upm.edu.my/id/eprint/96125/ A survey of Sybil attack countermeasures in IoT-based wireless sensor networks Arshad, Akashah Mohd Hanapi, Zurina Subramaniam, Shamala Latip, Rohaya Wireless sensor networks (WSN) have been among the most prevalent wireless innovations over the years exciting new Internet of Things (IoT) applications. IoT based WSN integrated with Internet Protocol IP allows any physical objects with sensors to be connected ubiquitously and send real-time data to the server connected to the Internet gate. Security in WSN remains an ongoing research trend that falls under the IoT paradigm. A WSN node deployed in a hostile environment is likely to open security attacks such as Sybil attack due to its distributed architecture and network contention implemented in the routing protocol. In a Sybil attack, an adversary illegally advertises several false identities or a single identity that may occur at several locations called Sybil nodes. Therefore, in this paper, we give a survey of the most up-to-date assured methods to defend from the Sybil attack. The Sybil attack countermeasures includes encryption, trust, received signal indicator (RSSI), encryption and artificial intelligence. Specifically, we survey different methods, along with their advantages and disadvantages, to mitigate the Sybil attack. We discussed the lesson learned and the future avenues of study and open issues in WSN security analysis. PeerJ 2021 Article PeerReviewed Arshad, Akashah and Mohd Hanapi, Zurina and Subramaniam, Shamala and Latip, Rohaya (2021) A survey of Sybil attack countermeasures in IoT-based wireless sensor networks. PeerJ Computer Science, 7. art. no. 763. pp. 1-31. ISSN 2376-5992 https://peerj.com/articles/cs-673/ 10.7717/peerj-cs.673
spellingShingle Arshad, Akashah
Mohd Hanapi, Zurina
Subramaniam, Shamala
Latip, Rohaya
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_full A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_fullStr A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_full_unstemmed A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_short A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
title_sort survey of sybil attack countermeasures in iot-based wireless sensor networks
url http://psasir.upm.edu.my/id/eprint/96125/
http://psasir.upm.edu.my/id/eprint/96125/
http://psasir.upm.edu.my/id/eprint/96125/