会议专题

SybilACO: Ant colony optimization in defending against Sybil attacks in the wireless Sensor Network

Security b a significant factor in many sensor network systems, such as peer-to-peer networks. Most distributed systems are known to be particularly vulnerable to Sybil attacks. In a Sybil attack, a malicious node fakes multiple identities and pretends to be multiple, distinct nodes in the system. Then an edge may exit between a Sybil node and an honest node if a malicious node successfully foob a honest node into trusting it In this paper, we propose a novel protocol to limit the influence of Sybil attacks by combining ant colony optimization (ACO) algorithm, where a node does random works; it will leave traib on the path. However, with the random work, the traib of the first node left on each node become diluted, at the end the routing it just fades away. Based on the nature of the ACO, we can limit the number of attack edge in an efficiently and conveniently. Hence, our defending system can ensure a honest node would accept and be accepted by other honest nodes in system with high probability, also, reject Sybil nodes with great probability.

Sybil attack Sybil identity ant colony optimization

Bin Zeng Benyue Chen

School of Information Engineering Zhejiang Forestry University Linan, Zhejiang, China School of Environmental Science and Technology Zhejiang Forestry University Linan, Zhejiang, China

国际会议

2010 International Conference on Computer and Communication Technologies in Agriculture Engineering(计算机与通信技术在农业工程国际会议 CCTAE 2010)

成都

英文

357-360

2010-06-12(万方平台首次上网日期,不代表论文的发表时间)