Detection of Sybil attacks in participatory sensing using Cloud based Trust Management System

Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. Different from other participatory sensing application challenges who consider user privacy and data trustworthiness, we consider network trustworthiness problem namely Sybil attacks in participatory sensing. Sybil attacks focus on creating multiple online user identities called Sybil identities and try to achieve malicious results through these identities. In this paper, we proposed a Cloud based Trust Management Scheme (CbTMS) framework for detecting Sybil attacks in participatory sensing network. Our CbTMS was proposed for performing Sybil attack characteristic check and trustworthiness management system to verify coverage nodes in the participatory sensing. To verify the proposed framework, we are currently developing the proposed scheme on OMNeT++ network simulator in multiple scenarios to achieve Sybil identities detection in our simulation environment.

[1]  Gregory D. Abowd,et al.  HealthSense: classification of health-related sensor data through user-assisted machine learning , 2008, HotMobile '08.

[2]  Shih-Hao Chang,et al.  A Fuzzy Knowledge Based Fault Tolerance Algorithm in Wireless Sensor Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[3]  Gaetano Borriello,et al.  BALANCE: towards a usable pervasive wellness application with accurate activity inference , 2009, HotMobile '09.

[4]  Rudolf Hornig,et al.  An overview of the OMNeT++ simulation environment , 2008, Simutools 2008.

[5]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[6]  Mark H. Hansen,et al.  Participatory sensing - eScholarship , 2006 .

[7]  Frank Leymann,et al.  Compliant Cloud Computing (C3): Architecture and Language Support for User-Driven Compliance Management in Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[8]  Brian Neil Levine,et al.  Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.

[9]  Miguel A. Labrador,et al.  On Sensor Data Verification for Participatory Sensing Systems , 2013, J. Networks.

[10]  Sebastian Ries,et al.  Extending Bayesian trust models regarding context-dependence and user friendly representation , 2009, SAC '09.

[11]  Landon P. Cox,et al.  LiveCompare: grocery bargain hunting through participatory sensing , 2009, HotMobile '09.

[12]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[13]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[14]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[15]  Vijay Laxmi,et al.  A sybil attack detection approach using neighboring vehicles in VANET , 2011, SIN '11.