Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks

被引:7
|
作者
Bochem, Arne [1 ]
Leiding, Benjamin [2 ]
机构
[1] Univ Goettingen, Inst Comp Sci, D-37077 Gottingen, Germany
[2] Tech Univ Clausthal, Inst Software & Syst Engn, D-38678 Clausthal Zellerfeld, Germany
关键词
Internet of Things; Identity; security; authentication; Sybil attack; blockchain; self sovereign identity; ATTACK DETECTION; SECURITY FLAWS; METHODOLOGY;
D O I
10.3390/s21093257
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker's goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Distributed token circulation on mobile ad hoc networks
    Malpani, N
    Vaidya, NH
    Welch, JL
    NETWORK PROTOCOLS, 2001, : 4 - 13
  • [22] Distributed communication algorithms for ad hoc mobile networks
    Chatzigiannakis, I
    Nikoletseas, S
    Spirakis, P
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2003, 63 (01) : 58 - 74
  • [23] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping1
    2.State Key Lab of Information Security
    Journal of Systems Engineering and Electronics, 2008, (04) : 851 - 859
  • [24] Distributed Data Sharing in Mobile Ad Hoc Networks
    Houngbadji, Therence
    Pierre, Samuel
    2010 AUSTRALASIAN TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ATNAC), 2010,
  • [25] Distributed intrusion detection for mobile ad hoc networks
    Yi, P
    Jiang, YC
    Zhong, YP
    Zhang, SY
    2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2005, : 94 - 97
  • [26] Distributed intrusion detection for mobile ad hoc networks
    Yi Ping
    Jiang Xinghao
    Wu Yue
    Liu Ning
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (04) : 851 - 859
  • [27] A distributed clustering framework in mobile ad hoc networks
    Garg, W
    Shyamasundar, RK
    ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 32 - 38
  • [28] Advances In Distributed Security For Mobile Ad Hoc Networks
    Filipek, Jozef
    Hudec, Ladislav
    COMPUTER SYSTEMS AND TECHNOLOGIES, COMPSYSTECH'16, 2016, : 89 - 96
  • [29] A distributed monitoring mechanism for mobile ad hoc networks
    Song, JH
    Hong, F
    Guo, YJ
    8th International Symposium on Parallel Architectures, Algorithms and Networks, Proceedings, 2005, : 236 - 240
  • [30] Trajectory as an Identity: Privacy-Preserving and Sybil-Resistant Authentication for Internet of Vehicles
    Li, Jiangtao
    Song, Zhaoheng
    Li, Yufeng
    Cao, Chenhong
    He, Yuanhang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021