IoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Title | IoT Object Security towards the Sybil Attack Using the Trustworthiness Management |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Hadiansyah, R., Suryani, V., Wardana, A. A. |
Conference Name | 2020 8th International Conference on Information and Communication Technology (ICoICT) |
Keywords | authentication, composability, data exchange, electronic data interchange, Internet of Things, intruder object, IoT object security, Metrics, performance evaluation, physical object, pubcrawl, Resiliency, security attacks, security of data, Sensors, Servers, Sybil attack, sybil attacks, time 18.1029 s, time 9.3287 s, Topology, trust value, trustworthiness, trustworthiness management |
Abstract | Internet of Things (IoT), commonly referred to a physical object connected to network, refers to a paradigm in information technology integrating the advances in terms of sensing, computation and communication to improve the service in daily life. This physical object consists of sensors and actuators that are capable of changing the data to offer the improvement of service quality in daily life. When a data exchange occurs, the exchanged data become sensitive; making them vulnerable to any security attacks, one of which, for example, is Sybil attack. This paper aimed to propose a method of trustworthiness management based upon the authentication and trust value. Once performing the test on three scenarios, the system was found to be capable of detecting the Sybil attack rapidly and accurately. The average of time to detect the Sybil attacks was 9.3287 seconds and the average of time required to detect the intruder object in the system was 18.1029 seconds. The accuracy resulted in each scenario was found 100% indicating that the detection by the system to Sybil attack was 100% accurate. |
DOI | 10.1109/ICoICT49345.2020.9166162 |
Citation Key | hadiansyah_iot_2020 |
- Resiliency
- trustworthiness management
- trust value
- Topology
- time 9.3287 s
- time 18.1029 s
- sybil attacks
- Sybil attack
- Servers
- sensors
- security of data
- security attacks
- trustworthiness
- physical object
- performance evaluation
- Metrics
- IoT object security
- intruder object
- Internet of Things
- electronic data interchange
- data exchange
- authentication
- composability
- pubcrawl