Sybil attack in IOT: Modelling and defenses
Title | Sybil attack in IOT: Modelling and defenses |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Rajan, A., Jithish, J., Sankaran, S. |
Conference Name | 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI) |
Keywords | ad hoc on-demand distance vector, AODV, behavioural profiling, composability, computer network security, defense mechanism, delays, EAODV, EAODV protocol, enhanced AODV protocol, information technology, Internet of Things, IoT network, legitimate nodes, Metrics, neighbouring nodes, Peer-to-peer computing, pubcrawl, Resiliency, Routing, Routing protocols, security, sybil attacks, sybil nodes, Throughput, trust value |
Abstract | Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact on performance. We also develop a defense mechanism based on behavioural profiling of nodes. We develop an enhanced AODV (EAODV) protocol by using the behaviour approach to obtain the optimal routes. In EAODV, the routes are selected based on the trust value and hop count. Sybil nodes are identified and discarded based on the feedback from neighbouring nodes. Evaluation of our protocol in ns-2 simulator demonstrates the effectiveness of our approach in identifying and detecting sybil nodes in IoT network. |
URL | https://ieeexplore.ieee.org/document/8126193/ |
DOI | 10.1109/ICACCI.2017.8126193 |
Citation Key | rajan_sybil_2017 |
- legitimate nodes
- trust value
- Throughput
- sybil nodes
- sybil attacks
- security
- Routing protocols
- Routing
- Resiliency
- pubcrawl
- Peer-to-peer computing
- neighbouring nodes
- Metrics
- ad hoc on-demand distance vector
- IoT network
- Internet of Things
- information technology
- enhanced AODV protocol
- EAODV protocol
- EAODV
- delays
- defense mechanism
- computer network security
- composability
- behavioural profiling
- AODV