In this attack, a single node i.e. a malicious node will appear to
be a set of nodes and will send incorrect information to a node in
the network.
The incorrect information can be a variety of things [10],
including position of nodes, signal strengths, making up nodes
that do not exist.
Authentication and encryption techniques can prevent an outsider
to launch a Sybil attack on the sensor network. However, an
insider cannot be prevented from participating in the network,
but he should only be able to do so using the identities of the
nodes he has compromised.
Public key cryptography can prevent such an insider attack, but it
is too expensive to be used in the resource constrained sensor