skip to main content
10.1145/2645672.2645673acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Stalk me if you can: the anatomy of sybil attacks in opportunistic networks

Published: 07 September 2014 Publication History

Abstract

Opportunistic Networks are envisioned to complement infrastruc-ture-based communication in overloaded cellular settings, in remote areas, during and immediately after large scale disasters. On account of their highly distributed and dynamic nature, as well as of their dependence on the honest cooperation of nodes, Opportunistic Networks are particularly vulnerable to sybil attacks. In a sybil attack, a node assumes multiple identities and attempts to form many links to the rest of the network, with the aim of gaining access to resources, influencing the network, circumventing detection of misbehavior ("spread the blame"), etc. Sybil attacks have been studied extensively in the context of distributed systems and online social networks. However, the Opportunistic Networking setting brings new challenges, specific to the network conditions: forming links may require significant resources from the attacker (e.g. time, speed, multiple devices, etc), and each link is ephemeral. In this paper, we study the types and effectiveness of sybil attacks that are possible in Opportunistic Networks, under various resource constraints on the attacker. We evaluate each attack based on the influence the attacker can gain through it. We find that sybil attacks, even with relatively unconstrained resources, are much harder to implement in the Opportunistic Networking setting, due to the link establishment mechanisms using mobility. We believe this is a very important first step towards understanding and defending against sybil attacks in such networks.

References

[1]
Sermpezis P and Spyropoulos T. Understanding the effects of social selfishness on the performance of heterogeneous opportunistic networks. Elsevir ComCom, 48, 2014.
[2]
Li Y, Hui P et al. Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks. IEEE Communications Letters, 14(11), 2010.
[3]
Chen BB and Chan MC. MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network. INFOCOM. 2010.
[4]
Krifa A, Barakat C et al. Mobitrade: trading content in disruption tolerant networks. Chants. 2011.
[5]
Yu H, Kaminsky M et al. SybilGuard: Defending Against Sybil Attacks via Social Networks. IEEE/ACM ToN, 16(3), 2008.
[6]
Yu H, Gibbons PB et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. IEEE/ACM ToN, 18(3), 2010.
[7]
Danezis G and Mittal P. Sybilinfer: Detecting sybil nodes using social networks. NDSS. 2009.
[8]
Wei W, Xu F et al. SybilDefender : A Defense Mechanism for Sybil Attacks in Large Social Networks. IEEE Trans on Parallel and Distributed Systems, 24(12), 2013.
[9]
Cao Q, Sirivianos M et al. Aiding the detection of fake accounts in large scale social online services. NSDI, 2012.
[10]
Viswanath B, Post A et al. An analysis of social network-based Sybil defenses. SIGCOMM Computer Communication Rev, 40(4), 2010.
[11]
Alvisi L, Clement A et al. SoK: The Evolution of Sybil Defense via Social Networks. 2013 IEEE Symposium on Security and Privacy, :382--396, 2013.
[12]
Hui P, Crowcroft J et al. BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks. MobiHoc. 2011.
[13]
Hossmann T, Spyropoulos T et al. Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing. INFOCOM. 2010.
[14]
Quercia D and Hailes S. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue. INFOCOM. 2010.
[15]
Piro C, Shields C et al. Detecting the Sybil Attack in Mobile Ad hoc Networks. Securecomm and Workshops. 2006.
[16]
Tangpong A, Kesidis G et al. Robust Sybil Detection for MANETs. ICCCN. 2009.
[17]
Ureten O and Serinken N. Wireless security through RF fingerprinting. IEEE Canadian Journal of Electrical and Computer Engineering, 32(1), 2007.
[18]
Abbas S, Merabti M et al. Lightweight Sybil Attack Detection in MANETs. IEEE Systems Journal, 2012. ISSN 1932--8184.
[19]
Andersen R, Chung F et al. Local Graph Partitioning using PageRank Vectors. 2006.
[20]
Henderson T, Kotz D et al. The changing usage of a mature campus-wide wireless network. Computer Networks, 52(14), 2008.
[21]
Hsu WJ, Spyropoulos T et al. Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks. IEEE/ACM ToN, 17(5), 2009.
[22]
Blondel VD, Guillaume JL et al. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, (10), 2008.
[23]
Newman MEJ. Analysis of weighted networks. Physical Review E, 70(5), 2004.
[24]
Stytz MR. Considering defense in depth for software applications. Security & Privacy, IEEE, 2004.
[25]
Capkun S, Hubaux JP et al. Mobility helps peer-to-peer security. IEEE TMC, 5(1), 2006.

Cited By

View all
  • (2024)Security attacks in Opportunistic Mobile Networks: A systematic literature reviewJournal of Network and Computer Applications10.1016/j.jnca.2023.103782221(103782)Online publication date: Jan-2024
  • (2018)On location-privacy in opportunistic mobile networks, a surveyJournal of Network and Computer Applications10.1016/j.jnca.2017.10.022103:C(157-170)Online publication date: 1-Feb-2018
  • (2016)Unmasking non-simultaneous sybils in mobile opportunistic networks2016 Ninth International Conference on Contemporary Computing (IC3)10.1109/IC3.2016.7880235(1-6)Online publication date: Aug-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHANTS '14: Proceedings of the 9th ACM MobiCom workshop on Challenged networks
September 2014
104 pages
ISBN:9781450330718
DOI:10.1145/2645672
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. opportunistic network
  2. sybil attack

Qualifiers

  • Research-article

Conference

MobiCom'14
Sponsor:

Acceptance Rates

CHANTS '14 Paper Acceptance Rate 15 of 37 submissions, 41%;
Overall Acceptance Rate 61 of 159 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Security attacks in Opportunistic Mobile Networks: A systematic literature reviewJournal of Network and Computer Applications10.1016/j.jnca.2023.103782221(103782)Online publication date: Jan-2024
  • (2018)On location-privacy in opportunistic mobile networks, a surveyJournal of Network and Computer Applications10.1016/j.jnca.2017.10.022103:C(157-170)Online publication date: 1-Feb-2018
  • (2016)Unmasking non-simultaneous sybils in mobile opportunistic networks2016 Ninth International Conference on Contemporary Computing (IC3)10.1109/IC3.2016.7880235(1-6)Online publication date: Aug-2016

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media