Analytical Model for Sybil Attack Phases in Internet of Things

被引:55
|
作者
Mishra, Alekha Kumar [1 ]
Tripathy, Asis Kumar [2 ]
Puthal, Deepak [3 ]
Yang, Laurence T. [4 ]
机构
[1] Natl Inst Technol Jamshedpur, Dept Comp Applicat, Jamshedpur, Bihar, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
[3] Univ Technol Sydney, Sch Elect & Data Engn, Sydney, NSW 2007, Australia
[4] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G2W5, Canada
来源
IEEE INTERNET OF THINGS JOURNAL | 2019年 / 6卷 / 01期
关键词
Attacker model; identity replacement policy; Internet of Things (IoT); node compromise; security threats; sensing domain; sybil; V2G NETWORKS; SECURITY; AUTHENTICATION; MITIGATION; BLOCKCHAIN; IOT;
D O I
10.1109/JIOT.2018.2843769
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The sybil attack in Internet of Things (IoT) commonly aims the sensing domain that may impose serious threat to the devices both in perception and communication layer. The singularity of the sybil attack is a sybil node that publish multiple identities of legitimate devices. It is highly essential to learn the behavior and predict possible actions of a sybil attacker while devising a defense mechanism for it. This paper provides a comprehensive characteristic analysis of sybil attack in IoT. Based on the nature of the task performed during this attack, it is classified into three phases as compromise, deployment, and launching phase. The compromise phase is modeled as an automaton with attacker state transition as a Markov chain model. A heuristic is also proposed for selection criteria of an attacker to compromise a node. In the deployment phase of the attack, an algorithm based on K-mean clustering is proposed to group compromised identities and deploy the sybil node for corresponding identities without violating the set of adjacent nodes. In the launching phase, the process of replacing sybil identities either over time or on detection is modeled using age replacement policy. The results depict that the proposed model effectively visualize the behavior of a sybil attacker in challenging environments of IoT.
引用
收藏
页码:379 / 387
页数:9
相关论文
共 50 条
  • [31] Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
    Alshehri, Asma Hassan
    [J]. PeerJ Computer Science, 2024, 10 : 1 - 22
  • [32] Wormhole attack detection and mitigation model for Internet of Things and WSN using machine learning
    Alshehri, Asma Hassan
    [J]. PEERJ COMPUTER SCIENCE, 2024, 10
  • [33] Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] Quantifying resistance to the Sybil attack
    Margolin, N. Boris
    Levine, Brian Neil
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 1 - 15
  • [35] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things
    Khan, Muhammad Ali
    Bin Rais, Rao Naveed
    Khalid, Osman
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 827 - 843
  • [36] Internet of Things as an Attack Vector to Critical Infrastructures of Cities
    Gallegos-Segovia, Pablo L.
    Bravo-Torres, Jack F.
    Argudo-Parra, Johnny J.
    Sacoto-Cabrera, Erwin J.
    Larios-Rosillo, Victor M.
    [J]. 2017 INTERNATIONAL CARIBBEAN CONFERENCE ON DEVICES, CIRCUITS AND SYSTEMS (ICCDCS), 2017, : 117 - 120
  • [37] Detection of false data injection attack in the Internet of things
    Hu Xiangdong
    Yu Pengqin
    [J]. MANAGEMENT, MANUFACTURING AND MATERIALS ENGINEERING, PTS 1 AND 2, 2012, 452-453 : 932 - +
  • [38] Information Fusion to Defend Intentional Attack in Internet of Things
    Chen, Pin-Yu
    Cheng, Shin-Ming
    Chen, Kwang-Cheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04): : 337 - 348
  • [39] Command Disaggregation Attack and Mitigation in Industrial Internet of Things
    Xun, Peng
    Zhu, Pei-Dong
    Hu, Yi-Fan
    Cui, Peng-Shuai
    Zhang, Yan
    [J]. SENSORS, 2017, 17 (10)
  • [40] DIO Suppression Attack Against Routing in the Internet of Things
    Perazzo, Pericle
    Vallati, Carlo
    Anastasi, Giuseppe
    Dini, Gianluca
    [J]. IEEE COMMUNICATIONS LETTERS, 2017, 21 (11) : 2524 - 2527