A Novel Sybil Attack Detection Mechanism for Mobile IoT Networks

被引:1
|
作者
Dogan-Tusha, Seda [1 ]
Althunibat, Saud [2 ]
Qaraqe, Marwa [1 ]
机构
[1] Hamad Bin Khalifa Univ, Qatar Fdn, Div Informat & Comp Technol, Coll Sci & Engn, Doha, Qatar
[2] Al Hussein Bin Talal Univ, Dept Commun Engn, Maan, Jordan
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
关键词
Doppler effect; illegitimate nodes; mobility; IoT networks; OFDM transmission; security; Sybil attack; WIRELESS SENSOR NETWORKS; CFO ESTIMATION;
D O I
10.1109/GLOBECOM48099.2022.10000934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT (Internet of Things) networks are becoming an integral part of everyday life. The exponential growth in these networks poses various privacy and security threats for the users and the vendors. Among these threats are Sybil attacks, which occurs due to poor authentication capabilities and thus a malicious node gets access to any information on the host. The malicious node uses its' fake identities to impersonate legitimate nodes and transmit misleading data to the central entity. However, conventional cryptographical approaches are not always suitable for IoT nodes due to the their limited resources. Therefore, physical layer security (PLS) solutions become more and more important for IoT networks. In this regard, this study introduces a novel technique for detecting Sybil attacks in mobile networks, which stands in contrast to the current methods developed for stationary environment, i.e., time-invariant channel. Specifically, this work exploits the Doppler shift caused by the mobility in the environment to identify Sybil nodes in the network. If the nodes belong to the same terminal, they experience the same amount of Doppler shift. The detection performance of the proposed scheme has been evaluated under different system configurations. The obtained results show that the performance of the proposed scheme improves as the amount of Doppler shift increases.
引用
收藏
页码:1838 / 1843
页数:6
相关论文
共 50 条
  • [11] Efficient Analysis of Lightweight Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Mulla, Mohsin
    Sambare, Santosh
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [12] Detection and Prevention of Black Hole Attack and Sybil Attack in Vehicular Ad Hoc Networks
    Yadav, Dhananjay
    Chaubey, Nirbhay Kumar
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, COMS2 2024, 2025, 2174 : 176 - 189
  • [13] LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks
    Kaliyar, Pallavi
    Ben Jaballah, Wafa
    Conti, Mauro
    Lal, Chhagan
    COMPUTERS & SECURITY, 2020, 94
  • [14] Sybil Attack in IoT: Modelling and Defenses
    Rajan, Anjana
    Jithish, J.
    Sankaran, Sriram
    2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 2323 - 2327
  • [15] Node ID based detection of Sybil attack in mobile wireless sensor network
    Sharmila, S.
    Umamaheswari, G.
    INTERNATIONAL JOURNAL OF ELECTRONICS, 2013, 100 (10) : 1441 - 1454
  • [16] A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things
    Murali, Sarumathi
    Jamalipour, Abbas
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01): : 379 - 388
  • [17] Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
    Almesaeed, Reham
    Al-Salem, Eman
    WIRELESS NETWORKS, 2022, 28 (04) : 1361 - 1374
  • [18] Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks
    Reham Almesaeed
    Eman Al-Salem
    Wireless Networks, 2022, 28 : 1361 - 1374
  • [19] Sybil Attack Detection using Sequential Hypothesis Testing in Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2014 INTERNATIONAL CONFERENCE ON SIGNAL PROPAGATION AND COMPUTER TECHNOLOGY (ICSPCT 2014), 2014, : 698 - 702
  • [20] A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
    Arshad, Akashah
    Hanapi, Zurina Mohd
    Subramaniam, Shamala
    Latip, Rohaya
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 33