A Novel Sybil Attack Detection Mechanism for Mobile IoT Networks

被引:1
|
作者
Dogan-Tusha, Seda [1 ]
Althunibat, Saud [2 ]
Qaraqe, Marwa [1 ]
机构
[1] Hamad Bin Khalifa Univ, Qatar Fdn, Div Informat & Comp Technol, Coll Sci & Engn, Doha, Qatar
[2] Al Hussein Bin Talal Univ, Dept Commun Engn, Maan, Jordan
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
关键词
Doppler effect; illegitimate nodes; mobility; IoT networks; OFDM transmission; security; Sybil attack; WIRELESS SENSOR NETWORKS; CFO ESTIMATION;
D O I
10.1109/GLOBECOM48099.2022.10000934
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT (Internet of Things) networks are becoming an integral part of everyday life. The exponential growth in these networks poses various privacy and security threats for the users and the vendors. Among these threats are Sybil attacks, which occurs due to poor authentication capabilities and thus a malicious node gets access to any information on the host. The malicious node uses its' fake identities to impersonate legitimate nodes and transmit misleading data to the central entity. However, conventional cryptographical approaches are not always suitable for IoT nodes due to the their limited resources. Therefore, physical layer security (PLS) solutions become more and more important for IoT networks. In this regard, this study introduces a novel technique for detecting Sybil attacks in mobile networks, which stands in contrast to the current methods developed for stationary environment, i.e., time-invariant channel. Specifically, this work exploits the Doppler shift caused by the mobility in the environment to identify Sybil nodes in the network. If the nodes belong to the same terminal, they experience the same amount of Doppler shift. The detection performance of the proposed scheme has been evaluated under different system configurations. The obtained results show that the performance of the proposed scheme improves as the amount of Doppler shift increases.
引用
收藏
页码:1838 / 1843
页数:6
相关论文
共 50 条
  • [31] An Overview of Sybil Attack Detection Mechanisms in VFC
    Yang, Haonan
    Zhong, Yongchao
    Yang, Bo
    Yang, Yiyu
    Xu, Zifeng
    Wang, Longjuan
    Zhang, Yuqing
    52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 117 - 122
  • [32] A novel botnet attack detection for IoT networks based on communication graphs
    Munoz, David Concejal
    Valiente, Antonio del-Corte
    CYBERSECURITY, 2023, 6 (01)
  • [33] A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
    Lim, Kiho
    Islam, Tariqul
    Kim, Hyunbum
    Joung, Jingon
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [34] A survey on sybil attack detection in vehicular ad hoc networks (VANET)
    Abdulkader Z.A.
    Abdullah A.
    Abdullah M.T.
    Zukarnain Z.A.
    Abdullah, Azizol (azizol@upm.edu.my), 2018, Computer Society of the Republic of China (29) : 1 - 6
  • [35] A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network
    Shi, Wei
    Liu, Sanyang
    Zhang, Zhaohui
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (09): : 3738 - 3750
  • [36] Research on the P2P Sybil Attack and the Detection Mechanism
    Li, Qiang
    Li, Hui
    Wen, Zhongling
    Yuan, Pengfei
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 668 - 671
  • [37] Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function
    Pu, Cong
    Choo, Kim-Kwang Raymond
    COMPUTERS & SECURITY, 2022, 113
  • [38] Security approaches for data aggregation in Wireless Sensor Networks against Sybil Attack
    Singh, Surinder
    Saini, Hardeep Singh
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 190 - 193
  • [39] Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks
    Pal, Sarit
    Mukhopadhyay, Asish K.
    Bhattacharya, Partha Pratim
    IETE TECHNICAL REVIEW, 2008, 25 (04) : 209 - 215
  • [40] Sybil attack detection in VANET using neighbouring vehicles
    Grover, J.
    Laxmi, V.
    Gaur, M.S.
    International Journal of Security and Networks, 2014, 9 (04) : 222 - 233