ABSTRACT
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node illegitimately claims multiple identities. This paper systematically analyzes the threat posed by the Sybil attack to wireless sensor networks. We demonstrate that the attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. We establish a classification of different types of the Sybil attack, which enables us to better understand the threats posed by each type, and better design countermeasures against each type. We then propose several novel techniques to defend against the Sybil attack, and analyze their effectiveness quantitatively.
- P. Bahl and V. Padmanabhan. Radar: an in-building RF-based user location and tracking system. In Proceedings of IEEE Infocom, 2000.Google ScholarCross Ref
- R. Blom. Non-public key distribution. In Advances in Cryptology: Proceedings of Crypto '82, pages 231--236, 1982.Google Scholar
- C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology - Crypto '92, pages 471--486, 1992. Google ScholarDigital Library
- P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia. Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks, 7(6):609--616, 2001. Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, May 2003. Google ScholarDigital Library
- J. R. Douceur. The Sybil attack. In First International Workshop on Peer-to-Peer Systems (IPTPS '02), Mar. 2002. Google ScholarDigital Library
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In ACM CCS 2003, pages 42--51, Oct. 2003. Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, pages 41--47, Nov. 2002. Google ScholarDigital Library
- C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In First IEEE International Workshop on Sensor Network Protocols and Applications, pages 113--127, May 2003.Google ScholarCross Ref
- B. Karp and H. T. Kung. GPSR: greedy perimeter stateless routing for wireless networks. In International Conference on Mobile Computing and Networking, pages 243--254, 2000. Google ScholarDigital Library
- Y.-B. Ko and N. Vaidya. Location-aided routing (LAR) in mobile ad hoc networks. In Proceedings of the ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), pages 66--75. ACM, Oct. 1998. Google ScholarDigital Library
- D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In ACM CCS 2003, pages 52--61, Oct. 2003. Google ScholarDigital Library
- S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. TAG: a tiny aggregation service for ad hoc sensor networks. In Symposium on Operating Systems Design and Implementation, Nov. 2002. Google ScholarDigital Library
- Next-Generation Secure Computing Base (NGSCB). http://www.microsoft.com/resources/ngscb/default.mspx, 2003.Google Scholar
- R. D. Pietro, L. V. Mancini, and A. Mei. Random key assignment for secure wireless sensor networks. In ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003. Google ScholarDigital Library
- N. B. Priyantha, A. Chakraborty, and H. Balakrishnan. The Cricket location-support system. In Proceedings of ACM MobiCom, 2000. Google ScholarDigital Library
- S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker. GHT: a geographic hash table for data-centric storage. In WSNA 2002, Sept. Google ScholarDigital Library
- N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), September 2003. Google ScholarDigital Library
- A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWAtt: Software-based attestation for embedded devices. In Proceedings of the IEEE Symposium on Security and Privacy, May 2004.Google ScholarCross Ref
- Trusted Computing Group (TCG). https://www.trustedcomputinggroup.org/, 2003.Google Scholar
Index Terms
- The sybil attack in sensor networks: analysis & defenses
Recommendations
A sybil attack detection approach using neighboring vehicles in VANET
SIN '11: Proceedings of the 4th international conference on Security of information and networksVehicular Ad Hoc Network (VANET) is vulnerable to many security threats. One severe attack is Sybil attack, in which a malicious node forges a large number of fake identities in order to disrupt the proper functioning of VANET applications. In this ...
Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack
In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When ...
Location verification based defense against sybil attack in sensor networks
ICDCN'06: Proceedings of the 8th international conference on Distributed Computing and NetworkingSecurity is a major concern for a large fraction of sensor network applications. Douceur first introduced the notion of sybil attack [4], where a single entity(node) illegitimately presents multiple identities. As the nodes in sensor networks can be ...
Comments