A Novel Sybil Attack Detection Mechanism for Mobile IoT Networks

被引:1
作者
Dogan-Tusha, Seda [1 ]
Althunibat, Saud [2 ]
Qaraqe, Marwa [1 ]
机构
[1] Hamad Bin Khalifa Univ, Qatar Fdn, Div Informat & Comp Technol, Coll Sci & Engn, Doha, Qatar
[2] Al Hussein Bin Talal Univ, Dept Commun Engn, Maan, Jordan
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
关键词
Doppler effect; illegitimate nodes; mobility; IoT networks; OFDM transmission; security; Sybil attack; WIRELESS SENSOR NETWORKS; CFO ESTIMATION;
D O I
10.1109/GLOBECOM48099.2022.10000934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT (Internet of Things) networks are becoming an integral part of everyday life. The exponential growth in these networks poses various privacy and security threats for the users and the vendors. Among these threats are Sybil attacks, which occurs due to poor authentication capabilities and thus a malicious node gets access to any information on the host. The malicious node uses its' fake identities to impersonate legitimate nodes and transmit misleading data to the central entity. However, conventional cryptographical approaches are not always suitable for IoT nodes due to the their limited resources. Therefore, physical layer security (PLS) solutions become more and more important for IoT networks. In this regard, this study introduces a novel technique for detecting Sybil attacks in mobile networks, which stands in contrast to the current methods developed for stationary environment, i.e., time-invariant channel. Specifically, this work exploits the Doppler shift caused by the mobility in the environment to identify Sybil nodes in the network. If the nodes belong to the same terminal, they experience the same amount of Doppler shift. The detection performance of the proposed scheme has been evaluated under different system configurations. The obtained results show that the performance of the proposed scheme improves as the amount of Doppler shift increases.
引用
收藏
页码:1838 / 1843
页数:6
相关论文
共 23 条
[11]  
LIN X, 2021, P IEEE GLOB COMM C G, DOI DOI 10.1109/AUPEC52110.2021.9597727
[12]  
Ma Q., 2020, AAAI WORKSH DEEP LEA, P1, DOI DOI 10.1109/TETCI.2018.2823329
[13]   A TECHNIQUE FOR ORTHOGONAL FREQUENCY-DIVISION MULTIPLEXING FREQUENCY OFFSET CORRECTION [J].
MOOSE, PH .
IEEE TRANSACTIONS ON COMMUNICATIONS, 1994, 42 (10) :2908-2914
[14]   A Comprehensive Study of Security of Internet-of-Things [J].
Mosenia, Arsalan ;
Jha, Niraj K. .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (04) :586-602
[15]  
Newsome J, 2004, IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, P259
[16]   Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information [J].
Sarigiannidis, Panagiotis ;
Karapistoli, Eirini ;
Economides, Anastasios A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) :7560-7572
[17]   Detecting Sybil attacks in Wireless Sensor Networks using neighboring information [J].
Ssu, Kuo-Feng ;
Wang, Wei-Tong ;
Chang, Wen-Chung .
COMPUTER NETWORKS, 2009, 53 (18) :3042-3056
[18]  
Wang C., 2018, J INTERNET SERV INF, V8, P2
[19]   Detecting Sybil Nodes in Wireless Networks with Physical Layer Network Coding [J].
Wang, Weichao ;
Pu, Di ;
Wyglinski, Alex .
2010 IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS DSN, 2010, :21-30
[20]   Energy- and Cost-Efficient Physical Layer Security in the Era of IoT: The Role of Interference [J].
Wei, Zhongxiang ;
Masouros, Christos ;
Liu, Fan ;
Chatzinotas, Symeon ;
Ottersten, Bjorn .
IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (04) :81-87