Skip to main content

An Efficient Sybil Attack Detection for Internet of Things

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 931))

Abstract

The Internet of Things paradigm is about to emerge in full scale but various security vulnerabilities are still to be addressed. One of these is the threat of Sybil attacks. A Sybil attacker creates and controls more than one identity on its physical device. These illegitimate identities of the Sybil attacker may be used for numerous malicious activities without the fear of being detected and hence accountable for committed malign actions. One of the promising countermeasures of Sybil attacks is received signal strength based localization and detection systems. However, these schemes detect only the direct Sybil attackers, where no collusion among the identities is assumed; and these schemes also incur overhead in the form of periodic and persistent localization. In this paper, we propose a detection system that detects both direct and indirect Sybil identities using one-time localization without causing overhead in the form of period localization information dissemination. The analysis of our scheme shows that the incurred overhead is significantly low in terms of communication, storage, and computation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Qiu, T., Chen, N., Li, K., Atiquzzaman, M., Zhao, W.: How can heterogeneous Internet of Things build our future: a survey. IEEE Commun. Surv. Tut. 20(3), 2011–2027 (2018). Early access

    Article  Google Scholar 

  2. Paul, A., Daniel, A., Ahmad, A., Rho, S.: Cooperative cognitive intelligence for Internet of Vehicles. IEEE Syst. J. 11(3), 1249–1258 (2015)

    Article  Google Scholar 

  3. Lin, X., Yajnanarayana, V., Muruganathan, S.D., Gao, S., Asplund, H., Maattanen, H.-L., Bergstrom, M., Euler, S., Wang, Y.-P.E.: The sky is not the limit: LTE for unmanned aerial vehicles. IEEE Commun. Mag. 56(4), 204–210 (2018)

    Article  Google Scholar 

  4. Douceur, J.R.: The Sybil attack. In: First International Workshop on Peer-to-Peer Systems, pp. 251–260 (2002)

    Chapter  Google Scholar 

  5. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defences. Presented at the Third International Symposium on Information Processing in Sensor Networks (IPSN 2004) (2004)

    Google Scholar 

  6. Han, S., Ban, D., Park, W., Gerla, M.: Localization of Sybil nodes with electro-acoustic positioning in VANETs. In: IEEE Global Communications Conference GLOBECOM 2017, pp. 1–6 (2017)

    Google Scholar 

  7. Yao, Y., Xiao, B., Wu, G., Liu, X., Yu, Z., Zhang, K., Zhou, X.: Multi-channel based Sybil attack detection in vehicular ad hoc networks using RSSI. IEEE Trans. Mob. Comput. (2018). Early Access

    Google Scholar 

  8. Demirbas, M., Song, Y.: An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: Proceedings of the International Symposium on World of Wireless, Mobile and Multimedia Networks (2006)

    Google Scholar 

  9. Shaohe, L., Xiaodong, W.F., Xin, Z., Xingming, Z.: Detecting the Sybil attack cooperatively in wireless sensor networks. In: International Conference on Computational Intelligence and Security, pp. 442–446 (2008)

    Google Scholar 

  10. Amini, F., Misic, J., Pourreza, H.: Detection of Sybil attack in beacon enabled IEEE 802. 15.4 networks. In: International Wireless Communications and Mobile Computing Conference, pp. 1058–1063 (2008)

    Google Scholar 

  11. Xiao, B., Yu, B., Gao, C.: Detection and localization of Sybil nodes in VANETs. Presented at the Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, Los Angeles, CA, USA (2006)

    Google Scholar 

  12. Hashmi, S., Brooke, J.: Towards Sybil resistant authentication in mobile ad hoc networks. In: Fourth International Conference on Emerging Security Information Systems and Technologies (SECURWARE), pp. 17–24 (2010)

    Google Scholar 

  13. Yuan, Y., Huo, L., Wang, Z., Hogrefe, D.: Secure APIT localization scheme against Sybil attacks in distributed wireless sensor networks. IEEE Access 6, 27629–27636 (2018)

    Article  Google Scholar 

  14. Iwendi, C., Uddin, M., Ansere, J.A., Nkurunziza, P., Anajemba, J., Bashir, A.K.: On detection of Sybil attack in large-scale VANETs using spider-monkey technique. IEEE Access 6, 47258–47267 (2018)

    Article  Google Scholar 

  15. Tangpong, A., Kesidis, G., Hsu, H.-Y., Hurson, A.: Robust Sybil detection for MANETs. In: Proceedings of the 18th International Conference on Computer Communications and Networks, ICCCN 2009, pp. 1–6 (2009)

    Google Scholar 

  16. Chen, Y., Yang, J., Trappe, W., Martin, R.P.: Detecting and localizing identity-based attacks in wireless and sensor networks. IEEE Trans. Veh. Technol. 59(5), 2418–2434 (2010)

    Article  Google Scholar 

  17. Garcia-Naya, J.A., Heath, R., Kaltenberger, F., Rupp, M., Via, J.: Experimental evaluation in wireless communications. EURASIP J. Wirel. Commun. Netw. 2017(1), 59 (2017)

    Article  Google Scholar 

  18. Newport, C., Kotz, D., Yuan, Y., Gray, R., Liu, J., Elliott, C.: Experimental evaluation of wireless simulation assumptions. Simul. Trans. Soc. Mod. Sim. Int. 83(9), 643–661 (2007)

    Google Scholar 

  19. Sheng, Z., Li, L., Yanbin, L., Richard, Y.: Privacy-preserving location based services for mobile users in wireless networks. Department of Computer Science, Yale University, Technical report ALEU/DCS/TR-1297 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sohail Abbas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abbas, S. (2019). An Efficient Sybil Attack Detection for Internet of Things. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) New Knowledge in Information Systems and Technologies. WorldCIST'19 2019. Advances in Intelligent Systems and Computing, vol 931. Springer, Cham. https://doi.org/10.1007/978-3-030-16184-2_33

Download citation

Publish with us

Policies and ethics