ABSTRACT
Opportunistic Networks are envisioned to complement infrastruc-ture-based communication in overloaded cellular settings, in remote areas, during and immediately after large scale disasters. On account of their highly distributed and dynamic nature, as well as of their dependence on the honest cooperation of nodes, Opportunistic Networks are particularly vulnerable to sybil attacks. In a sybil attack, a node assumes multiple identities and attempts to form many links to the rest of the network, with the aim of gaining access to resources, influencing the network, circumventing detection of misbehavior ("spread the blame"), etc. Sybil attacks have been studied extensively in the context of distributed systems and online social networks. However, the Opportunistic Networking setting brings new challenges, specific to the network conditions: forming links may require significant resources from the attacker (e.g. time, speed, multiple devices, etc), and each link is ephemeral. In this paper, we study the types and effectiveness of sybil attacks that are possible in Opportunistic Networks, under various resource constraints on the attacker. We evaluate each attack based on the influence the attacker can gain through it. We find that sybil attacks, even with relatively unconstrained resources, are much harder to implement in the Opportunistic Networking setting, due to the link establishment mechanisms using mobility. We believe this is a very important first step towards understanding and defending against sybil attacks in such networks.
- Sermpezis P and Spyropoulos T. Understanding the effects of social selfishness on the performance of heterogeneous opportunistic networks. Elsevir ComCom, 48, 2014.Google Scholar
- Li Y, Hui P et al. Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks. IEEE Communications Letters, 14(11), 2010. Google ScholarDigital Library
- Chen BB and Chan MC. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network. INFOCOM. 2010. Google ScholarDigital Library
- Krifa A, Barakat C et al. Mobitrade: trading content in disruption tolerant networks. Chants. 2011. Google ScholarDigital Library
- Yu H, Kaminsky M et al. SybilGuard: Defending Against Sybil Attacks via Social Networks. IEEE/ACM ToN, 16(3), 2008. Google ScholarDigital Library
- Yu H, Gibbons PB et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. IEEE/ACM ToN, 18(3), 2010. Google ScholarDigital Library
- Danezis G and Mittal P. Sybilinfer: Detecting sybil nodes using social networks. NDSS. 2009.Google Scholar
- Wei W, Xu F et al. SybilDefender : A Defense Mechanism for Sybil Attacks in Large Social Networks. IEEE Trans on Parallel and Distributed Systems, 24(12), 2013. Google ScholarDigital Library
- Cao Q, Sirivianos M et al. Aiding the detection of fake accounts in large scale social online services. NSDI, 2012. Google ScholarDigital Library
- Viswanath B, Post A et al. An analysis of social network-based Sybil defenses. SIGCOMM Computer Communication Rev, 40(4), 2010. Google ScholarDigital Library
- Alvisi L, Clement A et al. SoK: The Evolution of Sybil Defense via Social Networks. 2013 IEEE Symposium on Security and Privacy, :382--396, 2013. Google ScholarDigital Library
- Hui P, Crowcroft J et al. BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks. MobiHoc. 2011. Google ScholarDigital Library
- Hossmann T, Spyropoulos T et al. Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing. INFOCOM. 2010. Google ScholarDigital Library
- Quercia D and Hailes S. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. INFOCOM. 2010. Google ScholarDigital Library
- Piro C, Shields C et al. Detecting the Sybil Attack in Mobile Ad hoc Networks. Securecomm and Workshops. 2006.Google ScholarCross Ref
- Tangpong A, Kesidis G et al. Robust Sybil Detection for MANETs. ICCCN. 2009. Google ScholarDigital Library
- Ureten O and Serinken N. Wireless security through RF fingerprinting. IEEE Canadian Journal of Electrical and Computer Engineering, 32(1), 2007.Google Scholar
- Abbas S, Merabti M et al. Lightweight Sybil Attack Detection in MANETs. IEEE Systems Journal, 2012. ISSN 1932--8184.Google Scholar
- Andersen R, Chung F et al. Local Graph Partitioning using PageRank Vectors. 2006.Google Scholar
- Henderson T, Kotz D et al. The changing usage of a mature campus-wide wireless network. Computer Networks, 52(14), 2008. Google ScholarDigital Library
- Hsu WJ, Spyropoulos T et al. Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks. IEEE/ACM ToN, 17(5), 2009. Google ScholarDigital Library
- Blondel VD, Guillaume JL et al. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, (10), 2008.Google Scholar
- Newman MEJ. Analysis of weighted networks. Physical Review E, 70(5), 2004.Google Scholar
- Stytz MR. Considering defense in depth for software applications. Security & Privacy, IEEE, 2004. Google ScholarDigital Library
- Capkun S, Hubaux JP et al. Mobility helps peer-to-peer security. IEEE TMC, 5(1), 2006. Google ScholarDigital Library
Index Terms
- Stalk me if you can: the anatomy of sybil attacks in opportunistic networks
Recommendations
Stalk and lie-The cost of Sybil attacks in opportunistic networks
Opportunistic Networks are envisioned to complement infrastructure-based communication in overloaded cellular settings, in remote areas, or during and immediately after large scale disasters. On account of their highly distributed and dynamic nature, as ...
A sybil attack detection approach using neighboring vehicles in VANET
SIN '11: Proceedings of the 4th international conference on Security of information and networksVehicular Ad Hoc Network (VANET) is vulnerable to many security threats. One severe attack is Sybil attack, in which a malicious node forges a large number of fake identities in order to disrupt the proper functioning of VANET applications. In this ...
Evaluation of Black hole, Wormhole and Sybil Attacks in Mobile Ad-hoc Networks
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesA mobile ad hoc network (MANET) is an infrastructure-less network of various mobile devices and generally known for its self configuring behavior. MANET can communicate over relatively bandwidth constrained wireless links. Due to limited bandwidth ...
Comments