A Novel Sybil Attack Detection Mechanism for Mobile IoT Networks

被引:1
|
作者
Dogan-Tusha, Seda [1 ]
Althunibat, Saud [2 ]
Qaraqe, Marwa [1 ]
机构
[1] Hamad Bin Khalifa Univ, Qatar Fdn, Div Informat & Comp Technol, Coll Sci & Engn, Doha, Qatar
[2] Al Hussein Bin Talal Univ, Dept Commun Engn, Maan, Jordan
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
关键词
Doppler effect; illegitimate nodes; mobility; IoT networks; OFDM transmission; security; Sybil attack; WIRELESS SENSOR NETWORKS; CFO ESTIMATION;
D O I
10.1109/GLOBECOM48099.2022.10000934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT (Internet of Things) networks are becoming an integral part of everyday life. The exponential growth in these networks poses various privacy and security threats for the users and the vendors. Among these threats are Sybil attacks, which occurs due to poor authentication capabilities and thus a malicious node gets access to any information on the host. The malicious node uses its' fake identities to impersonate legitimate nodes and transmit misleading data to the central entity. However, conventional cryptographical approaches are not always suitable for IoT nodes due to the their limited resources. Therefore, physical layer security (PLS) solutions become more and more important for IoT networks. In this regard, this study introduces a novel technique for detecting Sybil attacks in mobile networks, which stands in contrast to the current methods developed for stationary environment, i.e., time-invariant channel. Specifically, this work exploits the Doppler shift caused by the mobility in the environment to identify Sybil nodes in the network. If the nodes belong to the same terminal, they experience the same amount of Doppler shift. The detection performance of the proposed scheme has been evaluated under different system configurations. The obtained results show that the performance of the proposed scheme improves as the amount of Doppler shift increases.
引用
收藏
页码:1838 / 1843
页数:6
相关论文
共 50 条
  • [21] Similarity-Based and Sybil Attack Defended Community Detection for Social Networks
    Jiang, Zhongyuan
    Li, Jing
    Ma, Jianfeng
    Yu, Philip S.
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (12) : 3487 - 3491
  • [22] A Novel Code Attestation Scheme Against Sybil Attack in Wireless Sensor Networks
    Makhdoom, Imran
    Afzal, Mehreen
    Rashid, Imran
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 1 - 6
  • [23] A Novel Prevention Mechanism for Sybil Attack in Online Social Network
    AlRubaian, Majed
    Al-Qurishi, Muhammad
    Rahman, Sk Md Mizanur
    Alamri, Atif
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [24] Sybil Attack Detection for Secure IoT-Based Smart Healthcare Environments
    Li J.
    Wang Z.
    Journal of The Institution of Engineers (India): Series B, 2024, 105 (06) : 1557 - 1569
  • [25] A Lightweight Sybil Attack Detection Framework for Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2014 SEVENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2014, : 387 - 393
  • [26] Impersonation Attack Detection in IoT Networks
    Dinh Duc Nha Nguyen
    Sood, Keshav
    Xiang, Yong
    Gao, Longxiang
    Chi, Lianhua
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6061 - 6066
  • [27] The Sybil attack in sensor networks: Analysis & defenses
    Newsome, J
    Shi, E
    Song, D
    Perrig, A
    IPSN '04: THIRD INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2004, : 259 - 268
  • [28] Multivariate verication for sybil attack detection in VANET
    Grover, Jyoti
    Gaur, Manoj Singh
    Laxmi, Vijay
    OPEN COMPUTER SCIENCE, 2015, 5 (01) : 60 - 78
  • [29] Work-in-Progress: A Novel Approach to Detection and Avoid Sybil Attack in MANET
    Sastry, Anitha S.
    Chitlapalli, Sadhana S.
    Akhila, S.
    CYBER-PHYSICAL SYSTEMS AND DIGITAL TWINS, 2020, 80 : 429 - 441
  • [30] A NOVEL SYBIL ATTACK DETECTION SCHEME FOR WIRELESS SENSOR NETWORK
    Tian, Bin
    Yao, Yizhan
    Shi, Lei
    Shao, Shuai
    Liu, Zhaohui
    Xu, Changxing
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 294 - 297