Analytical Model for Sybil Attack Phases in Internet of Things

被引:54
|
作者
Mishra, Alekha Kumar [1 ]
Tripathy, Asis Kumar [2 ]
Puthal, Deepak [3 ]
Yang, Laurence T. [4 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Comp Applicat, Jamshedpur, Bihar, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[3] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW 2007, Australia
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G2W5, Canada
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 01期
关键词
Attacker model; identity replacement policy; Internet of Things (IoT); node compromise; security threats; sensing domain; sybil; V2G NETWORKS; SECURITY; AUTHENTICATION; MITIGATION; BLOCKCHAIN; IOT;
D O I
10.1109/JIOT.2018.2843769
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sybil attack in Internet of Things (IoT) commonly aims the sensing domain that may impose serious threat to the devices both in perception and communication layer. The singularity of the sybil attack is a sybil node that publish multiple identities of legitimate devices. It is highly essential to learn the behavior and predict possible actions of a sybil attacker while devising a defense mechanism for it. This paper provides a comprehensive characteristic analysis of sybil attack in IoT. Based on the nature of the task performed during this attack, it is classified into three phases as compromise, deployment, and launching phase. The compromise phase is modeled as an automaton with attacker state transition as a Markov chain model. A heuristic is also proposed for selection criteria of an attacker to compromise a node. In the deployment phase of the attack, an algorithm based on K-mean clustering is proposed to group compromised identities and deploy the sybil node for corresponding identities without violating the set of adjacent nodes. In the launching phase, the process of replacing sybil identities either over time or on detection is modeled using age replacement policy. The results depict that the proposed model effectively visualize the behavior of a sybil attacker in challenging environments of IoT.
引用
收藏
页码:379 / 387
页数:9
相关论文
共 50 条
  • [1] Sybil Attack in RPL-Based Internet of Things: Analysis and Defenses
    Pu, Cong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 4937 - 4949
  • [2] Evaluation of Sybil Attack Detection Approaches in the Internet of Things Content Dissemination
    Evangelista, Danilo
    Mezghani, Farouk
    Nogueira, Michele
    Santos, Aldri
    [J]. 2016 WIRELESS DAYS (WD), 2016,
  • [3] A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things
    Groves, Bryan
    Pu, Cong
    [J]. MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [4] A Lightweight Intrusion Detection for Sybil Attack Under Mobile RPL in the Internet of Things
    Murali, Sarumathi
    Jamalipour, Abbas
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01): : 379 - 388
  • [5] Sybil Attack Detection in Internet of Flying Things-IoFT: A Machine Learning Approach
    Chulerttiyawong, Donpiti
    Jamalipour, Abbas
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (14) : 12854 - 12866
  • [6] Sybil Attacks and Their Defenses in the Internet of Things
    Zhang, Kuan
    Liang, Xiaohui
    Lu, Rongxing
    Shen, Xuemin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 372 - 383
  • [7] Hybrid deep learning model for attack detection in internet of things
    Rekha, H.
    Siddappa, M.
    [J]. SERVICE ORIENTED COMPUTING AND APPLICATIONS, 2022, 16 (04) : 293 - 312
  • [8] Trust Evaluation Model for Attack Detection in Social Internet of Things
    Abdelghani, Wafa
    Zayani, Corinne Amel
    Amous, Ikram
    Sedes, Florence
    [J]. RISKS AND SECURITY OF INTERNET AND SYSTEMS, 2019, 11391 : 48 - 64
  • [9] Hybrid deep learning model for attack detection in internet of things
    H. Rekha
    M. Siddappa
    [J]. Service Oriented Computing and Applications, 2022, 16 : 293 - 312
  • [10] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260