Visible to the public IoT Object Security towards the Sybil Attack Using the Trustworthiness Management

TitleIoT Object Security towards the Sybil Attack Using the Trustworthiness Management
Publication TypeConference Paper
Year of Publication2020
AuthorsHadiansyah, R., Suryani, V., Wardana, A. A.
Conference Name2020 8th International Conference on Information and Communication Technology (ICoICT)
Keywordsauthentication, composability, data exchange, electronic data interchange, Internet of Things, intruder object, IoT object security, Metrics, performance evaluation, physical object, pubcrawl, Resiliency, security attacks, security of data, Sensors, Servers, Sybil attack, sybil attacks, time 18.1029 s, time 9.3287 s, Topology, trust value, trustworthiness, trustworthiness management
Abstract

Internet of Things (IoT), commonly referred to a physical object connected to network, refers to a paradigm in information technology integrating the advances in terms of sensing, computation and communication to improve the service in daily life. This physical object consists of sensors and actuators that are capable of changing the data to offer the improvement of service quality in daily life. When a data exchange occurs, the exchanged data become sensitive; making them vulnerable to any security attacks, one of which, for example, is Sybil attack. This paper aimed to propose a method of trustworthiness management based upon the authentication and trust value. Once performing the test on three scenarios, the system was found to be capable of detecting the Sybil attack rapidly and accurately. The average of time to detect the Sybil attacks was 9.3287 seconds and the average of time required to detect the intruder object in the system was 18.1029 seconds. The accuracy resulted in each scenario was found 100% indicating that the detection by the system to Sybil attack was 100% accurate.

DOI10.1109/ICoICT49345.2020.9166162
Citation Keyhadiansyah_iot_2020