Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks

被引:7
|
作者
Bochem, Arne [1 ]
Leiding, Benjamin [2 ]
机构
[1] Univ Goettingen, Inst Comp Sci, D-37077 Gottingen, Germany
[2] Tech Univ Clausthal, Inst Software & Syst Engn, D-38678 Clausthal Zellerfeld, Germany
关键词
Internet of Things; Identity; security; authentication; Sybil attack; blockchain; self sovereign identity; ATTACK DETECTION; SECURITY FLAWS; METHODOLOGY;
D O I
10.3390/s21093257
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker's goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks
    Bochem, Arne
    Leiding, Benjamin
    Hogrefe, Dieter
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 358 - 374
  • [2] Detecting the sybil attack in mobile ad hoc networks
    Piro, Chris
    Shields, Clay
    Levine, Brian Neil
    2006 SECURECOMM AND WORKSHOPS, 2006, : 285 - +
  • [3] A Sybil-Resistant Truth Discovery Framework for Mobile Crowdsensing
    Lin, Jian
    Yang, Dejun
    Wu, Kun
    Tang, Jian
    Xue, Guoliang
    2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, : 871 - 880
  • [4] Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Khan, Muhammad Sajid
    Iltaf, Naima
    Rashdi, Adnan
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 30 - 36
  • [5] Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
    Ponnusamy, Vasaki
    Humayun, Mamoona
    Jhanjhi, N. Z.
    Yichiet, Aun
    Almufareh, Maram Fahhad
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 40 (03): : 1199 - 1215
  • [6] Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks
    Ponnusamy V.
    Humayun M.
    Jhanjhi N.Z.
    Yichiet A.
    Almufareh M.F.
    Computer Systems Science and Engineering, 2021, 40 (03): : 1199 - 1215
  • [7] A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification
    Lesueur, Francois
    Me, Ludovic
    Tong, Valerie Viet Triem
    17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 105 - 110
  • [8] Internet Connectivity for Ad hoc Mobile Networks
    Sun Y.
    Belding-Royer E.M.
    Perkins C.E.
    International Journal of Wireless Information Networks, 2002, 9 (02) : 75 - 88
  • [9] Internet connectivity for mobile ad hoc networks
    Perkins, CE
    Malinen, JT
    Wakikawa, R
    Nilsson, A
    Tuominen, AJ
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2002, 2 (05): : 465 - 482
  • [10] Design of routing protocol with the internet of things devices over mobile ad hoc networks
    Deepa, S.
    Sridhar, K. P.
    SIGNAL IMAGE AND VIDEO PROCESSING, 2023, 17 (08) : 4513 - 4522