Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

被引:15
|
作者
Chang, Shih-Hao [1 ]
Chen, Zhi-Rong [1 ]
机构
[1] Tamkang Univ, Dept Comp Sci & Informat Engn, New Taipei 25137, Taiwan
关键词
D O I
10.1155/2016/6506341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attack, which illegally forges multiple identities in peer-to-peer networks, namely, Sybil identities. These Sybil identities will falsify multiple identities that negatively influence the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with this problem, a cloud based trust management scheme (CbTMS) was proposed to detect Sybil attacks in the MCS network. The CbTMS was proffered for performing active and passive checking scheme, in addition to the mobile PCS trustworthiness management, and includes a decision tree algorithm, to verify the covered nodes in the MCS network. Simulation studies show that our CbTMS can efficiently detect the malicious Sybil nodes in the network and cause 6.87 Wh power reduction compared with other malicious Sybil node attack mode.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Detection of Sybil Attacks in Participatory Sensing using Cloud based Trust Management System
    Chang, Shih-Hao
    Chen, Yeong-Sheng
    Cheng, Shin-Ming
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON WIRELESS AND PERVASIVE COMPUTING (ISWPC), 2013,
  • [2] \A Dynamic-Trust-based Recruitment Framework for Mobile Crowd Sensing
    Gao, Yali
    Li, Xiaoyong
    Li, Jirui
    Gao, Yunquan
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [3] Physical Identification Based Trust Path Routing Against Sybil Attacks on RPL in IoT Networks
    Kim, Jae-Dong
    Ko, Minseok
    Chung, Jong-Moon
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (05) : 1102 - 1106
  • [4] An access control for IoT based on network community perception and social trust against Sybil attacks
    de Oliveira, Gustavo H. C.
    de Souza Batista, Agnaldo
    Nogueira, Michele
    dos Santos, Aldri L.
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2022, 32 (01)
  • [5] A Novel Incentive Mechanism Based on Reputation and Trust for Mobile Crowd Sensing Network
    Wang, Huilin
    Liu, Chunxiao
    Sun, Dawei
    Wang, Yanfeng
    [J]. 2018 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (ICCAIS), 2018, : 526 - 530
  • [6] Crowd Detection Management System Crowd Abnormal Behavior Detection and Management System Based on Mobile
    Shalash, Wafaa Mohib
    AlZahrani, Azzah Abdullah
    Al-Nufaii, Seham Hamad
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [7] Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks
    Haddaji, Achref
    Ayed, Samiha
    Fourati, Lamia Chaari
    [J]. 2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 155 - 163
  • [8] Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    Rokhani, Fakhrul Z.
    [J]. COMPUTER COMMUNICATIONS, 2017, 110 : 75 - 82
  • [9] A Biometrics-Based Behavioral Trust Framework for Continuous Mobile Crowd Sensing Recruitment
    Nasser, Ruba
    Mizouni, Rabeb
    Otrok, Hadi
    Singh, Shakti
    Abououf, Menatalla
    Kadadha, Maha
    [J]. IEEE ACCESS, 2022, 10 : 68582 - 68597
  • [10] Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring
    Hajian, Golbarg
    Ghahfarokhi, Behrouz Shahgholi
    Vasfi, Mehri Asadi
    Ladani, Behrouz Tork
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (1) : 655 - 675