Detection of Sybil Attacks in Participatory Sensing using Cloud based Trust Management System

被引:0
作者
Chang, Shih-Hao [1 ]
Chen, Yeong-Sheng [2 ]
Cheng, Shin-Ming [3 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, New Taipei City, Taiwan
[2] Natl Taipei Univ Educ, Dept Comp Sci, New Taipei 23741, Taiwan
[3] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei, Taiwan
来源
2013 INTERNATIONAL SYMPOSIUM ON WIRELESS AND PERVASIVE COMPUTING (ISWPC) | 2013年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. Different from other participatory sensing application challenges who consider user privacy and data trustworthiness, we consider network trustworthiness problem namely Sybil attacks in participatory sensing. Sybil attacks focus on creating multiple online user identities called Sybil identities and try to achieve malicious results through these identities. In this paper, we proposed a Cloud based Trust Management Scheme (CbTMS) framework for detecting Sybil attacks in participatory sensing network. Our CbTMS was proposed for performing Sybil attack characteristic check and trustworthiness management system to verify coverage nodes in the participatory sensing. To verify the proposed framework, we are currently developing the proposed scheme on OMNeT++ network simulator in multiple scenarios to achieve Sybil identities detection in our simulation environment.
引用
收藏
页数:6
相关论文
共 14 条
[1]  
Brandic I., 2010, P IEEE CLOUD 2010 JU
[2]  
Burke J., 2006, P ACM WSW OCT
[3]  
Chang S.-H., 2012, P IEEE AINA 2012 MAR, P891
[4]  
Deng L., 2009, P ACM HOTMOBILE 2009
[5]  
Denning T., 2009, P ACM HOTMOBILE 2009
[6]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[7]  
Grover Jyoti., 2011, P 4 INT C SECURITY I, P151
[8]  
Hornig R., 2008, P SIMUTOOLS 2008
[9]   Trusted Cloud Computing with Secure Resources and Data Coloring [J].
Hwang, Kai ;
Li, Deyi .
IEEE INTERNET COMPUTING, 2010, 14 (05) :14-22
[10]  
Ismail R, 2002, BLED ECONFERENCE