Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

被引:21
作者
Wang, Chundong [1 ,2 ]
Zhu, Likun [1 ,2 ]
Gong, Liangyi [1 ,2 ]
Zhao, Zhentang [1 ,2 ]
Yang, Lei [1 ,2 ]
Liu, Zheli [3 ]
Cheng, Xiaochun [4 ]
机构
[1] Tianjin Univ Technol, Key Lab Comp Vis & Syst, Minist Educ, Tianjin 300384, Peoples R China
[2] Tianjin Univ Technol, Tianjin Key Lab Intelligence Comp & Novel Softwar, Minist Educ, Tianjin 300384, Peoples R China
[3] Nankai Univ, Coll Comp & Control Engn, Tianjin 300350, Peoples R China
[4] Middlesex Univ, Dept Comp Sci, London NW4 4BT, England
基金
中国国家自然科学基金;
关键词
channel state information; Sybil attack; indoor AoA technology; DBSCAN algorithm; ENCRYPTION; LOCATION; DEFENSE;
D O I
10.3390/s18030878
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Authenticating Users Through Fine-Grained Channel Information
    Liu, Hongbo
    Wang, Yan
    Liu, Jian
    Yang, Jie
    Chen, Yingying
    Poor, H. Vincent
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (02) : 251 - 264
  • [2] A novel scheme based on coarse-grained localization and fine-grained isolation for defending against Sybil attack in low power and lossy networks
    Tong, Fei
    Zhang, Zhencheng
    Zhu, Ziyan
    Zhang, Yujian
    Chen, Cheng
    ASIAN JOURNAL OF CONTROL, 2025, 27 (01) : 51 - 62
  • [3] Sybil Attack Detection Method Based on Geographic Information in ZigBee
    Huang, Mei-gen
    Yu, Bin
    Kong, Zhi-yin
    Zhou, Wei-wei
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 336 - 341
  • [4] Locating Rogue Access Point Using Fine-Grained Channel Information
    Wang, Chen
    Zheng, Xiuyuan
    Chen, Yingying
    Yang, Jie
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (09) : 2560 - 2573
  • [5] A fine-grained indoor fingerprinting localization based on magnetic field strength and channel state information
    Huang, Xudong
    Guo, Songtao
    Wu, Yan
    Yang, Yuanyuan
    PERVASIVE AND MOBILE COMPUTING, 2017, 41 : 150 - 165
  • [6] A Fine-grained Channel State Information-based Deep Learning System for Dynamic Gesture Recognition
    Tong, Guoxiang
    Li, Yueyang
    Zhang, Haoyu
    Xiong, Naixue
    INFORMATION SCIENCES, 2023, 636
  • [7] Hades: Practical Decentralized Identity with Full Accountability and Fine-grained Sybil-resistance
    Wang, Ke
    Gao, Jianbo
    Wang, Qiao
    Zhang, Jiashuo
    Li, Yue
    Guan, Zhi
    Chen, Zhong
    39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 216 - 228
  • [8] Graffiti-writing recognition with fine-grained information
    Xu, Jiashuang
    Fu, Zhangjie
    Du, Xingyue
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 21 (02) : 163 - 172
  • [9] Fine-grained information flow control using attributes
    Han, Jinguang
    Chen, Liqun
    Susilo, Willy
    Huang, Xinyi
    Castiglione, Aniello
    Liang, Kaitai
    INFORMATION SCIENCES, 2019, 484 : 167 - 182
  • [10] Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function
    Pu, Cong
    Choo, Kim-Kwang Raymond
    COMPUTERS & SECURITY, 2022, 113