As the prevalence of Wireless Sensor Networks (WSNs) grows in the military and civil domains, network security becomes an evermore critical concern. In Sybil attack, malicious nodes forge a lot of fake identities to disrupt the network's protocols. Previous work used either authentication-based mechanisms which use shared encryption keys, or location information to verify the identities of the nodes. By contrast, this paper uses only neighboring node relation to verify the node identities. The evaluation results show that the detection rate was around 95% when the network was not very sparse.scheduling tasks and has the ability to communicate with nearby nodes via radio transmission. Because of the open nature of wireless channels, the network could be easily attacked by malicious eavesdroppers. This is clearly a major concern, particularly when the data sensed by the network is of a critical nature. Thus, how to effectively protect WSNs from malevolent attackers is increasingly an important issue.In Sybil attacks, each malicious node will forge multiple identities which do not physically exist within a network in order to mislead the legitimate nodes into believing that they have many neighbors [2]. Compared to other forms of network attacks, Sybil attacks can
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.