Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks

被引:7
|
作者
Bochem, Arne [1 ]
Leiding, Benjamin [2 ]
机构
[1] Univ Goettingen, Inst Comp Sci, D-37077 Gottingen, Germany
[2] Tech Univ Clausthal, Inst Software & Syst Engn, D-38678 Clausthal Zellerfeld, Germany
关键词
Internet of Things; Identity; security; authentication; Sybil attack; blockchain; self sovereign identity; ATTACK DETECTION; SECURITY FLAWS; METHODOLOGY;
D O I
10.3390/s21093257
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker's goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] Software solutions to Internet connectivity in mobile ad hoc networks
    Åhlund, C
    Zaslavsky, A
    PRODUCT FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, 2002, 2559 : 559 - 571
  • [42] Detecting Sybil attacks in vehicular ad hoc networks
    Hamdan S.
    Hudaib A.
    Awajan A.
    International Journal of Parallel, Emergent and Distributed Systems, 2021, 36 (02) : 69 - 79
  • [43] Combating Sybil Attacks in Vehicular Ad Hoc Networks
    Rabieh, Khaled Mohamed
    Azer, Marianne Amir
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 65 - 72
  • [44] Distributed topology control for stationary and mobile ad hoc networks
    Zhao, Liang
    Lloyd, Errol L.
    2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 481 - +
  • [45] A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
    Sen, Jaydip
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 538 - 547
  • [46] Distributed symmetric key management for mobile ad hoc networks
    Chan, ACF
    IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
  • [47] A distributed backup routes mechanism for mobile ad hoc networks
    Wang, YH
    Chuang, CC
    Chao, CF
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (02) : 516 - 526
  • [48] Distributed cooperative routing algorithm for mobile Ad Hoc networks
    Zhang W.
    Liu K.
    Wang L.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2011, 38 (05): : 34 - 39
  • [49] Distributed naming system for mobile ad-hoc networks
    Hong, XY
    Liu, J
    Smith, R
    Lee, YZ
    ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 509 - 515
  • [50] A distributed backbone formation algorithm for mobile ad hoc networks
    Dagdeviren, Orhan
    Erciyes, Kayhan
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2006, 4330 : 219 - +