Sybil attack in IOT: Modelling and defenses

Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact on performance. We also develop a defense mechanism based on behavioural profiling of nodes. We develop an enhanced AODV (EAODV) protocol by using the behaviour approach to obtain the optimal routes. In EAODV, the routes are selected based on the trust value and hop count. Sybil nodes are identified and discarded based on the feedback from neighbouring nodes. Evaluation of our protocol in ns-2 simulator demonstrates the effectiveness of our approach in identifying and detecting sybil nodes in IoT network.

[1]  Hannes Hartenstein,et al.  Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[2]  Li Gao,et al.  Grey theory based reputation system for secure neighbor discovery in wireless ad hoc networks , 2010, 2010 2nd International Conference on Future Computer and Communication.

[3]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  Ji Guo,et al.  A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[5]  Bharat Jayaraman,et al.  Sybil Attack Detection in Vehicular Networks , 2016, IoT 2016.

[6]  J. Jithin,et al.  Sybil defense mechanisms: A survey , 2015 .

[7]  M. V. Ramesh,et al.  Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[8]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[9]  Ali Mahani,et al.  Sybil attack Detection: Improving security of WSNs for smart power grid application , 2013, 2013 Smart Grid Conference (SGC).

[10]  Sriram Sankaran,et al.  Modeling and analysis of routing in IoT networks , 2015, 2015 International Conference on Computing and Network Communications (CoCoNet).

[11]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[12]  Mahdiyeh Alimohammadi,et al.  Sybil Attack Detection in Vehicular Networks , 2014 .