Provided by: Journal of Theoretical and Applied Information Technology
Date Added: Sep 2014
Security is imperative for some sensor network applications. An especially unsafe assault against sensor and impromptu systems is known as the Sybil attack, where a node illegitimately asserts numerous characters. In this type of attack a legal node is converted into a Sybil node which is a replica node with a different personality but using a similar ID. This leads to data leakage which causes data integrity violations. In existing research, nodes can detect the suspect nodes by checking the nodes in its neighborhood i.e. within a given range.