Sybil Attacks and Their Defenses in the Internet of Things

被引:246
作者
Zhang, Kuan [1 ]
Liang, Xiaohui [2 ]
Lu, Rongxing [3 ]
Shen, Xuemin [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Dartmouth Coll, Dept Comp Sci, Hanover, NH 03755 USA
[3] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Behavior classification; Internet of Things (IoT); mobile social network; social network; Sybil attack; MOBILE SOCIAL NETWORKS; DATA-SECURITY; PRIVACY; MANAGEMENT; SCHEME; AUTHENTICATION; PAGERANK; SERVICES; PROTOCOL;
D O I
10.1109/JIOT.2014.2344013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker's capabilities. We then present some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-based Sybil detection (BCSD), and mobile Sybil detection with the comprehensive comparisons. Finally, we discuss the challenging research issues and future directions for Sybil defense in IoT.
引用
收藏
页码:372 / 383
页数:12
相关论文
共 98 条
[21]  
[Anonymous], 2005, P 11 ACM SIGKDD INT
[22]  
Bilge L., 2009, P 18 INT C WORLD WID, P551, DOI [DOI 10.1145/1526709.1526784, 10.1145/1526709.1526784]
[23]  
Boneh D., 2004, CCS 04, P168, DOI DOI 10.1145/1030083.1030106
[24]   E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity [J].
Champion, Adam C. ;
Yang, Zhimin ;
Zhang, Boying ;
Dai, Jiangpeng ;
Xuan, Dong ;
Li, Du .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (08) :1535-1545
[25]  
Cheng A., 2005, P 2005 ACM SIGCOMM W, P128, DOI DOI 10.1145/1080192.1080202
[26]   Histograms of oriented gradients for human detection [J].
Dalal, N ;
Triggs, B .
2005 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, VOL 1, PROCEEDINGS, 2005, :886-893
[27]   Managing and sharing servents' reputations in P2P systems [J].
Damiani, E ;
di Vimercati, SD ;
Paraboschi, S ;
Samarati, P .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (04) :840-854
[28]  
Dandekar Pranav., 2011, P 12 ACM C ELECT COM, P147
[29]   SybilRes: A sybil-resilient flow-based decentralized reputation mechanism [J].
Delaviz, Rahim ;
Andrade, Nazareno ;
Pouwelse, Johan A. ;
Epema, Dick H. J. .
2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2012, :203-213
[30]  
Demirbas Murat., 2006, Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, P564