Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks

被引:7
|
作者
Bochem, Arne [1 ]
Leiding, Benjamin [2 ]
机构
[1] Univ Goettingen, Inst Comp Sci, D-37077 Gottingen, Germany
[2] Tech Univ Clausthal, Inst Software & Syst Engn, D-38678 Clausthal Zellerfeld, Germany
关键词
Internet of Things; Identity; security; authentication; Sybil attack; blockchain; self sovereign identity; ATTACK DETECTION; SECURITY FLAWS; METHODOLOGY;
D O I
10.3390/s21093257
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker's goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks
    Pal, Sarit
    Mukhopadhyay, Asish K.
    Bhattacharya, Partha Pratim
    IETE TECHNICAL REVIEW, 2008, 25 (04) : 209 - 215
  • [32] Efficient Analysis of Lightweight Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Mulla, Mohsin
    Sambare, Santosh
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [33] Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks
    Abbas, Sohail
    Merabti, Madjid
    Kifayat, Kashif
    Baker, Thar
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12): : 6214 - 6242
  • [34] Integrating Mobile Ad Hoc Networks with the Internet Based on OLSR
    Al Mojamed, Mohammad
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [35] A hybrid approach to Internet connectivity for mobile ad hoc networks
    Ratanchandani, P
    Kravets, R
    WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1522 - 1527
  • [36] Robust and flexible Internet connectivity for mobile ad hoc networks
    Nordstrom, Erik
    Gunningberg, Per
    Tschudin, Christian
    AD HOC NETWORKS, 2011, 9 (01) : 1 - 15
  • [37] Efficient Internet Access Framework for Mobile Ad Hoc Networks
    Attia, Radwa
    Rizk, Rawya
    Ali, Hesham Arafat
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (03) : 1689 - 1722
  • [38] Internet connectivity for mobile ad hoc networks: Solutions and challenges
    Ruiz, PM
    Ros, FJ
    Gomez-Skarmeta, A
    IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (10) : 118 - 125
  • [39] Performance of Internet access solutions in mobile ad hoc networks
    Hamidian, A
    Körner, U
    Nilsson, A
    WIRELESS SYSTEMS AND MOBILITY IN NEXT GENERATION INTERNET, 2005, 3427 : 189 - 201
  • [40] Efficient Internet Access Framework for Mobile Ad Hoc Networks
    Radwa Attia
    Rawya Rizk
    Hesham Arafat Ali
    Wireless Personal Communications, 2015, 84 : 1689 - 1722