Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obtained by captured benign nodes. Existing Sybil defensive mechanisms suffer from the restricted sensor network size, or cause excessive resource consumption for the sensor network. In this work we propose a Sybil node detection mechanism, based on Random Key Distribution (RKD) schemes that can cope with large network sizes and minimize the waste of resources. We explain the techniques each node can use in a network running q-composite RKD to detect Sybil identities and restrict their number. Our method requires no trust to other sensors, which is important to defend against the attack.

[1]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[2]  Sugata Sanyal,et al.  A Review of Techniques to Mitigate Sybil Attacks , 2012, ArXiv.

[3]  Qiang Wang,et al.  Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.

[4]  Jubilant J. Kizhakkethottam,et al.  A survey of techniques to prevent sybil attacks , 2015, 2015 International Conference on Soft-Computing and Networks Security (ICSNS).

[5]  Mary Baker,et al.  Preserving peer replicas by rate-limited sampled voting , 2003, SOSP '03.

[6]  Aboul Ella Hassanien,et al.  Key Pre-distribution Techniques for WSN Security Services , 2014, Bio-inspiring Cyber Security and Cloud Services.

[7]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[8]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[9]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[10]  Panagiotis Papadimitratos,et al.  Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.

[11]  Mary Baker,et al.  The LOCKSS peer-to-peer digital preservation system , 2005, TOCS.

[12]  Tyler Moore,et al.  Cooperative attack and defense in distributed networks , 2008 .

[13]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[14]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[15]  Qingtao Wu,et al.  A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks , 2013 .

[16]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[17]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[18]  Jie Wu,et al.  A Survey of Sybil Attacks in Networks , 2013 .

[19]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[20]  Panagiotis Papadimitratos,et al.  Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.

[21]  George Kesidis,et al.  Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[22]  Panagiotis Papadimitratos,et al.  Stealthy pre-attacks against random key pre-distribution security , 2012, 2012 IEEE International Conference on Communications (ICC).

[23]  Logan Washbourne A Survey of P2P Network Security , 2015, ArXiv.

[24]  Chunling Cheng,et al.  An Approach Based on Chain Key Predistribution against Sybil Attack in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[25]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[26]  Rupesh Gunturu,et al.  Survey of Sybil Attacks in Social Networks , 2015, ArXiv.

[27]  Christian Scheideler,et al.  Group Spreading: A Protocol for Provably Secure Distributed Name Service , 2004, ICALP.