Sybil Attacks and Their Defenses in the Internet of Things

被引:246
作者
Zhang, Kuan [1 ]
Liang, Xiaohui [2 ]
Lu, Rongxing [3 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Dartmouth Coll, Dept Comp Sci, Hanover, NH 03755 USA
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Behavior classification; Internet of Things (IoT); mobile social network; social network; Sybil attack; MOBILE SOCIAL NETWORKS; DATA-SECURITY; PRIVACY; MANAGEMENT; SCHEME; AUTHENTICATION; PAGERANK; SERVICES; PROTOCOL;
D O I
10.1109/JIOT.2014.2344013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker's capabilities. We then present some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-based Sybil detection (BCSD), and mobile Sybil detection with the comprehensive comparisons. Finally, we discuss the challenging research issues and future directions for Sybil defense in IoT.
引用
收藏
页码:372 / 383
页数:12
相关论文
共 98 条
[1]   Lightweight Sybil Attack Detection in MANETs [J].
Abbas, Sohail ;
Merabti, Madjid ;
Llewellyn-Jones, David ;
Kifayat, Kashif .
IEEE SYSTEMS JOURNAL, 2013, 7 (02) :236-248
[2]   A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks [J].
Abd Aziz, Azrina ;
Sekercioglu, Y. Ahmet ;
Fitzpatrick, Paul ;
Ivanovich, Milosh .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01) :121-144
[3]  
Al Mutaz M, 2013, ANN CONF PRIV SECUR, P340, DOI 10.1109/PST.2013.6596086
[4]   SoK: The Evolution of Sybil Defense via Social Networks [J].
Alvisi, Lorenzo ;
Clement, Allen ;
Epasto, Alessandro ;
Lattanzi, Silvio ;
Panconesi, Alessandro .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :382-396
[5]  
Andersen R, 2006, ANN IEEE SYMP FOUND, P475
[6]  
[Anonymous], IEEE SYST J IN PRESS
[7]  
[Anonymous], 2010, IMC 2010 P
[8]  
[Anonymous], 2010, P 8 INT C MOBILE SYS, DOI [DOI 10.1145/1814433.1814448, 10.1145/1814433.1814448]
[9]  
[Anonymous], ACM COMPUT SURVEYS
[10]  
[Anonymous], 2013, P IET INT RADAR C PP