Um controle de associações resistente a ataques Sybil para a disseminação segura de conteúdo da IoT
Abstract
The Internet of Things (IoT) comprises a diversity of heterogeneous objects that collect and disseminate data for Internet applications. The content dissemination on these networks is subject to various malicious actions, such as the identities impersonation made by Sybil attack. Although there are several Sybil attack detection techniques, such as LSD, they are costly, disregard heterogeneous devices and attackers with stolen identities. This work presents a association control mechanism for IoT, called SA2CI, which prevents the access Sybil attackers on content dissemination service. The SA2CI uses elliptic curve cryptography (ECC), physical unclonable functions (PUF), and identities receipts. The ECC technique provides key distribution and stablishes a secure channel with low cost. The physical unclonable function enables the verification of a device identity. Then, a receipt identity, calculated by the a device PUF, ensures its legitimacy. The effectiveness and efficiency of SA2CI were evaluated in IoT network using Network Simulator 3 (NS3).References
Abbas, S., Merabti, M., Llewellyn-Jones, D., and Kifayat, K. Lightweight sybil attack detection in manets. Systems Journal, 2013, páginas:236–248.
Chatzigiannakis, I., Pyrgelis, A., Spirakis, P. G., and Stamatiou, Y. C. Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2011, páginas 715–720.
Choden Konigsmark, S., Hwang, L. K., Chen, D., and Wong, M. D. System-of-pufs: Multilevel security for embedded systems. In Hardware/Software Codesign and System Synthesis (CODES+ ISSS), 2014, páginas 1–10.
Evangelista, D., dos Santos, A., and Nogueira, M. Avaliação das técnicas de detecção do ataque sybil na disseminação de conteúdo da internet das coisas. In XV Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBseg), 2015.
Guicheng, S. and Zhen, Y.. Application of elliptic curve cryptography in node authentication of internet of things. In Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013.
Le, V.-D., Scholten, H., and Havinga, P. Unified routing for data dissemination in smart city networks. In 3rd International Conference on the Internet of Things, 2012, páginas 175-182.
Mahalle, P. N., Anggorojati, B., Prasad, N. R., and Prasad, R.. Identity establishment and capability based access control (IECAC) scheme for internet of things. In 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), 2012, páginas 187–191.
Park, S., Aslam, B., Turgut, D., and Zou, C. C. Defense against sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Security and Communication Networks, 2013, páginas 523–538.
Perera, C., Zaslavsky, A., Christen, P., and Georgakopoulos, D. Sensing as a service model for smart cities supported by internet of things. Transactions on Emerging Telecommunications Technologies, páginas 81–93.
Pinol, O. P., Raza, S., Eriksson, J., and Voigt, T. Bsd-based elliptic curve cryptography for the open internet of things. In 7th International Conference New Technologies, Mobility and Security (NTMS), 2015, páginas 1-5.
Quercia, D. and Hailes, S. Sybil attacks against mobile users: friends and foes to the rescue. In INFOCOM, 2010, páginas 1–5.
Vamsi, P. R. and Kant, K. A lightweight sybil attack detection framework for wireless sensor networks. In Seventh International Conference on Contemporary Computing (IC3), 2014 páginas 387–393.
Wallgren, L., Raza, S., and Voigt, T. Routing attacks and countermeasures in the RPL-based Internet of things. International Journal of Distributed Sensor Networks, 2013.
Wu, C.-C., Chang, C.-C., and Lin, I.-C.. New sealed-bid electronic auction with fairness, security and efficiency. Journal of Computer Science and Technology, 2008, páginas 253–264.
Zheng, J. X. and Potkonjak, M. A digital puf-based ip protection architecture for network embedded systems. In Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, páginas 255–256.
Chatzigiannakis, I., Pyrgelis, A., Spirakis, P. G., and Stamatiou, Y. C. Elliptic curve based zero knowledge proofs and their applicability on resource constrained devices. In 8th International Conference on Mobile Adhoc and Sensor Systems (MASS), 2011, páginas 715–720.
Choden Konigsmark, S., Hwang, L. K., Chen, D., and Wong, M. D. System-of-pufs: Multilevel security for embedded systems. In Hardware/Software Codesign and System Synthesis (CODES+ ISSS), 2014, páginas 1–10.
Evangelista, D., dos Santos, A., and Nogueira, M. Avaliação das técnicas de detecção do ataque sybil na disseminação de conteúdo da internet das coisas. In XV Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBseg), 2015.
Guicheng, S. and Zhen, Y.. Application of elliptic curve cryptography in node authentication of internet of things. In Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013.
Le, V.-D., Scholten, H., and Havinga, P. Unified routing for data dissemination in smart city networks. In 3rd International Conference on the Internet of Things, 2012, páginas 175-182.
Mahalle, P. N., Anggorojati, B., Prasad, N. R., and Prasad, R.. Identity establishment and capability based access control (IECAC) scheme for internet of things. In 15th International Symposium on Wireless Personal Multimedia Communications (WPMC), 2012, páginas 187–191.
Park, S., Aslam, B., Turgut, D., and Zou, C. C. Defense against sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Security and Communication Networks, 2013, páginas 523–538.
Perera, C., Zaslavsky, A., Christen, P., and Georgakopoulos, D. Sensing as a service model for smart cities supported by internet of things. Transactions on Emerging Telecommunications Technologies, páginas 81–93.
Pinol, O. P., Raza, S., Eriksson, J., and Voigt, T. Bsd-based elliptic curve cryptography for the open internet of things. In 7th International Conference New Technologies, Mobility and Security (NTMS), 2015, páginas 1-5.
Quercia, D. and Hailes, S. Sybil attacks against mobile users: friends and foes to the rescue. In INFOCOM, 2010, páginas 1–5.
Vamsi, P. R. and Kant, K. A lightweight sybil attack detection framework for wireless sensor networks. In Seventh International Conference on Contemporary Computing (IC3), 2014 páginas 387–393.
Wallgren, L., Raza, S., and Voigt, T. Routing attacks and countermeasures in the RPL-based Internet of things. International Journal of Distributed Sensor Networks, 2013.
Wu, C.-C., Chang, C.-C., and Lin, I.-C.. New sealed-bid electronic auction with fairness, security and efficiency. Journal of Computer Science and Technology, 2008, páginas 253–264.
Zheng, J. X. and Potkonjak, M. A digital puf-based ip protection architecture for network embedded systems. In Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, páginas 255–256.
Published
2016-11-07
How to Cite
EVANGELISTA, Danilo; SILVA, Eduardo da; NOGUEIRA, Michele; SANTOS, Aldri.
Um controle de associações resistente a ataques Sybil para a disseminação segura de conteúdo da IoT. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 16. , 2016, Niterói.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2016
.
p. 16-29.
DOI: https://doi.org/10.5753/sbseg.2016.19295.
