Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

被引:21
|
作者
Wang, Chundong [1 ,2 ]
Zhu, Likun [1 ,2 ]
Gong, Liangyi [1 ,2 ]
Zhao, Zhentang [1 ,2 ]
Yang, Lei [1 ,2 ]
Liu, Zheli [3 ]
Cheng, Xiaochun [4 ]
机构
[1] Tianjin Univ Technol, Key Lab Comp Vis & Syst, Minist Educ, Tianjin 300384, Peoples R China
[2] Tianjin Univ Technol, Tianjin Key Lab Intelligence Comp & Novel Softwar, Minist Educ, Tianjin 300384, Peoples R China
[3] Nankai Univ, Coll Comp & Control Engn, Tianjin 300350, Peoples R China
[4] Middlesex Univ, Dept Comp Sci, London NW4 4BT, England
基金
中国国家自然科学基金;
关键词
channel state information; Sybil attack; indoor AoA technology; DBSCAN algorithm; ENCRYPTION; LOCATION; DEFENSE;
D O I
10.3390/s18030878
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information
    Zheng, Xiuyuan
    Wang, Chen
    Chen, Yingying
    Yang, Jie
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 211 - 219
  • [2] Fine-grained Emotion Role Detection Based on Retweet Information
    Yu, Zhiwen
    Yi, Fei
    Ma, Chao
    Wang, Zhu
    Guo, Bin
    Chen, Liming
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (01)
  • [3] A fast and accurate identification model for Rhinolophus bats based on fine-grained information
    Cao, Zhong
    Li, Chuxian
    Wang, Kunhui
    He, Kai
    Wang, Xiaoyun
    Yu, Wenhua
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [4] A fast and accurate identification model for Rhinolophus bats based on fine-grained information
    Zhong Cao
    Chuxian Li
    Kunhui Wang
    Kai He
    Xiaoyun Wang
    Wenhua Yu
    Scientific Reports, 13
  • [5] Authenticating Users Through Fine-Grained Channel Information
    Liu, Hongbo
    Wang, Yan
    Liu, Jian
    Yang, Jie
    Chen, Yingying
    Poor, H. Vincent
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (02) : 251 - 264
  • [6] A novel scheme based on coarse-grained localization and fine-grained isolation for defending against Sybil attack in low power and lossy networks
    Tong, Fei
    Zhang, Zhencheng
    Zhu, Ziyan
    Zhang, Yujian
    Chen, Cheng
    ASIAN JOURNAL OF CONTROL, 2025, 27 (01) : 51 - 62
  • [7] Physical Adversarial Patch Attack for Optical Fine-Grained Aircraft Recognition
    Li, Ke
    Wang, Di
    Zhu, Wenxuan
    Li, Shaofeng
    Wang, Quan
    Gao, Xinbo
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 436 - 448
  • [8] An adaptive wireless passive human detection via fine-grained physical layer information
    Gong, Liangyi
    Yang, Wu
    Zhou, Zimu
    Man, Dapeng
    Cai, Haibin
    Zhou, Xiancun
    Yang, Zheng
    AD HOC NETWORKS, 2016, 38 : 38 - 50
  • [9] Logical Coupling Based on Fine-Grained Change Information
    Robbes, Romain
    Pollet, Damien
    Lanza, Michele
    FIFTEENTH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2008, : 42 - 46
  • [10] Sybil Attack Detection Method Based on Geographic Information in ZigBee
    Huang, Mei-gen
    Yu, Bin
    Kong, Zhi-yin
    Zhou, Wei-wei
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 336 - 341