Skip to main content

The Sybil Attack in Participatory Sensing: Detection and Analysis

  • Conference paper
Intelligent Data analysis and its Applications, Volume I

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 297))

  • 1891 Accesses

Abstract

Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. Nevertheless, one of the most important issues and misgiving about participatory sensing applications is security. Different from other participatory sensing application challenges who consider user privacy and data trustworthiness, we consider network trustworthiness problem namely Sybil attacks in participatory sensing. Sybil attacks is a particularly harmful attack against participatory sensing application, where Sybil attacks focus on creating multiple online user identities called Sybil identities and try to achieve malicious results through these identities. In this paper, we proposed a Hybrid Trust Management (HTM) framework for detecting and analyze Sybil attacks in participatory sensing network. Our HTM was proposed for performing Sybil attack characteristic check and trustworthiness management system to verify coverage nodes in the participatory sensing. To verify the proposed framework, we are currently developing the proposed scheme on OMNeT++ network simulator in multiple scenarios to achieve Sybil identities detection in our simulation environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., Srivastava, M.B.: Participatory sensing. In: Proc. ACM WSW (October 2006)

    Google Scholar 

  2. Denning, T., Andrew, A., Chaudhri, R., Hartung, C., Lester, J., Borriello, G., Duncan, G.: BALANCE: Towards a usable pervasive wellness application with accurate activity inference. In: Proc. ACM HotMobile 2009 (February 2009)

    Google Scholar 

  3. Stuntebeck, E.P., Davis II, J.S., Abowd, G.D., Blount, M.: HealthSense: Classification of health-related sensor data through user-assisted machine learning. In: Proc. ACM HotMobile 2008 (February 2008)

    Google Scholar 

  4. Deng, L., Cox, L.P.: LiveCompare: grocery bargain hunting through participatory sensing. In: Proc. ACM HotMobile 2009 (February 2009)

    Google Scholar 

  5. Mendez, D., Labrador, M.A.: On sensor data verification for participatory sensing systems. Journal of Networks 8(3), 576–587 (2013)

    Article  Google Scholar 

  6. Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Grover, J., Gaur, M.S., Laxmi, V.: A Sybil attack detection approach using neighboring vehicles in VANET. In: Proc. SIN 2011, pp. 151–158 (November 2011)

    Google Scholar 

  8. Josang, A., Ismail, R.: The Beta reputation system. In: Proc. 15th Bled Electron. Commerce Conf. (June 2002)

    Google Scholar 

  9. Ries, S.: Extending Bayesian trust models regarding context-dependence and user friendly representation. In: Proc. ACM SAC 2009, pp. 213–237 (March 2009)

    Google Scholar 

  10. Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and language support for user-driven compliance management in clouds. In: Proc. IEEE CLOUD 2010 (July 2010)

    Google Scholar 

  11. Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Computing 14(5), 14–22 (2010)

    Article  Google Scholar 

  12. Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil attack in ad hoc networks. In: SecureComm 2006 (August 2006)

    Google Scholar 

  13. Chang, S.-H., Huang, T.-S.: A fuzzy knowledge based fault tolerance algorithm in wireless sensor networks. In: Proc. IEEE AINA 2012, pp. 891–896 (March 2012)

    Google Scholar 

  14. Hornig, R., Varga, A.: An overview of the OMNeT++ simulation environment. In: Proc. SIMUTools 2008 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shih-Hao Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Chang, SH., Tseng, KK., Cheng, SM. (2014). The Sybil Attack in Participatory Sensing: Detection and Analysis. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume I. Advances in Intelligent Systems and Computing, vol 297. Springer, Cham. https://doi.org/10.1007/978-3-319-07776-5_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07776-5_30

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07775-8

  • Online ISBN: 978-3-319-07776-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics