Journal of Theoretical and Applied Information Technology
Security is imperative for some sensor network applications. An especially unsafe assault against sensor and impromptu systems is known as the Sybil attack, where a node illegitimately asserts numerous characters. In this type of attack a legal node is converted into a Sybil node which is a replica node with a different personality but using a similar ID. This leads to data leakage which causes data integrity violations. In existing research, nodes can detect the suspect nodes by checking the nodes in its neighborhood i.e. within a given range.