Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks

As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Authentication or identity management systems that prevent users from setting up arbitrary numbers of nodes are often missing in MANETs. As a result, attackers are able to introduce nodes with a multitude of identities into the network, thereby controlling a substantial fraction of the system and undermining its functionality and security. Additionally, MANETs are often partitioned and lack Internet access. As a result, implementing conventional measures based on central authorities is difficult. This paper fills the gap by introducing a decentralized blockchain-based identity system called Unchained. Unchained binds identities of nodes to addresses on a blockchain and economically disincentivizes the production of spurious identities by raising the costs of placing large numbers of Sybil identities in a network. Care is taken to ensure that circumventing Unchained results in costs similar or higher than following the protocol. We describe an offline verification scheme, detail the functionalities of the concept, discuss upper- and lower-bounds of security guarantees and evaluate Unchained based on case-studies.

[1]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[2]  O. Bussmann The Future of Finance: FinTech, Tech Disruption, and Orchestrating Innovation , 2017 .

[3]  Bin Xiao,et al.  Detection and localization of sybil nodes in VANETs , 2006, DIWANS '06.

[4]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[5]  Feng Hao,et al.  Authenticated Key Exchange over Bitcoin , 2015, SSR.

[6]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[7]  Dieter Hogrefe,et al.  Self-managed and blockchain-based vehicular ad-hoc networks , 2016, UbiComp Adjunct.

[8]  Jeremy Clark,et al.  SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.

[9]  Jubilant J. Kizhakkethottam,et al.  A survey of techniques to prevent sybil attacks , 2015, 2015 International Conference on Soft-Computing and Networks Security (ICSNS).

[10]  J. Li,et al.  Smart city and the applications , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[11]  Muhammad Irfan,et al.  Mobile Ad-Hoc Networks Applications and Its Challenges , 2016 .

[12]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[13]  Patrick Dai,et al.  Smart-Contract Value-Transfer Protocols on a Distributed Mobile Application Platform , 2017 .

[14]  Quoc Khanh Nguyen,et al.  Blockchain - A Financial Technology for Future Sustainable Development , 2016, 2016 3rd International Conference on Green Technology and Sustainable Development (GTSD).

[15]  Madjid Merabti,et al.  Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.

[16]  Rajamani Vayanaperumal,et al.  Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method , 2015, TheScientificWorldJournal.

[17]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[18]  Daniel Miller,et al.  Digital Anthropology , 2018, Cambridge Encyclopedia of Anthropology.

[19]  Abdellah Ait Ouahman,et al.  Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .

[20]  George Kesidis,et al.  Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[21]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[22]  Benjamin Leiding,et al.  Authcoin: Validation and Authentication in Decentralized Networks , 2016, MCIS.

[23]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[24]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).