Thwarting Attackers in the Wireless Networks without Trusted Authorities

Due to the broadcast nature of the wireless medium, wireless networks are especially vulnerable to Sybil attacks, where a malicious node illegitimately claims a large number of identities and thus depletes system resources. A wireless sensor network consists of many sensor nodes which are deployed to monitor physical or environmental conditions and to pass the collected data to a base station. Though wireless sensor network is subjected to have major applications in all the areas, it also has many security threats and attacks. Among all threats such as sinkhole, wormhole, selective forwarding, denial of service and node replication, Sybil attack is a major attack where a single node has multiple identities. When a Sybil node acts as a sender, it can send false data to its neighbors. When it acts as receiver, it can receive the data which is originally destined for a legitimate node. Further, we note that prior signal print methods are easily defeated by mobile attackers and develop an appropriate challenge-response defense. Finally, we present the Mason test, the first implementation of these techniques for ad hoc and delay-tolerant networks. A message can be sent to the receiver directly without trusted authorities.

[1]  Prateek Mittal,et al.  SybilControl: practical sybil defense with computational puzzles , 2012, STC '12.

[2]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[3]  Lionel M. Ni,et al.  Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[4]  Li Shang,et al.  Collaborative calibration and sensor placement for mobile sensor networks , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).

[5]  Wenyuan Xu,et al.  Securing wireless systems via lower layer enforcements , 2006, WiSe '06.

[6]  Nikita Borisov,et al.  Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[9]  Peter Druschel,et al.  Peer-to-peer systems , 2010, Commun. ACM.

[10]  Shriram K. Vasudevan,et al.  Sybil Guard: Defending Against Sybil Attacks via Social Networks , 2010 .

[11]  Paul Gardner-Stephen,et al.  The Serval Project: Practical Wireless Ad-Hoc Mobile Telecommunications , 2011 .

[12]  Andreas Haeberlen,et al.  Practical robust localization over large-scale 802.11 wireless networks , 2004, MobiCom '04.

[13]  Alec Yasinsac,et al.  Peer identification in wireless and sensor networks using signal properties , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[14]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[15]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[16]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[17]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[18]  Mahalingam Ramkumar,et al.  An efficient key predistribution scheme for ad hoc network security , 2005, IEEE Journal on Selected Areas in Communications.

[19]  Larry J. Greenstein,et al.  Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.

[20]  Xiaodong Wang,et al.  Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.