Avaliação das Técnicas de Detecção do Ataque Sybil na Disseminação de Conteúdo da Internet das Coisas

  • Danilo Evangelista UFPR
  • Michele Nogueira UFPR
  • Aldri Santos UFPR

Abstract


The Internet of Things (IoT) comprises a diversity of heterogeneous objects.They act in these networks collecting continuous and discrete data and disseminating this information to applications thus providing a welfare for people. The data dissemination service in the IoT uses the wireless medium that is unsafe. Thus, this service can be tampered by various types of attackers such as blackhole, sinkhole and the Sybil. Among these, the Sybil attack emerged as the most critical since it operates in the confidentiality of this data. Although the solutions found in the literature are effective against Sybil attack, they disregard the presence of heterogeneous devices or have complex solutions. This paper presents a study on the efficiency and effectiveness of attack detection techniques. Thus, this evaluation uses metrics of effectiveness and efficiency in order to assess the performance of an engine with characteristics closer the IoT.

References

Abbas, S., Merabti, M., Llewellyn-Jones, D., and Kifayat, K. (2013). Lightweight sybil attack detection in manets. Systems Journal, IEEE, 7(2):236-248.

Agrawal, S. and Vieira, D. (2013). A survey on internet of things-doi 10.5752/p. 2316-9451.2013 v1n2p78. Abakós, 1(2):78-95.

Blazquez, A., Tsiatsis, V., and Vandikas, K. (2015). Performance evaluation of openid connect for an iot information marketplace. In Vehicular Technology Conference (VTC Spring), 2015 IEEE 81st, pages 1-6. IEEE.

Buttyan, L. and Holczer, T. (2012). Traffic analysis attacks and countermeasures in wireless body area sensor networks. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE International Symposium on a, pages 1-6. IEEE.

Cervantes, C. A. V. (2014). Um sistema de detecção de ataques sinkhole sobre 6lowpan para internet das coisas.

da Silva, E., Santos, A. L., Albini, L. C. P., and Lima, M. N. (2008). Quantifying misbehavior attacks against the self-organized public key management on MANETs. In Proceedings of International Conference on Security and Cryptography (SECRYPT ’08), pages 128-135, Porto, Portugal. INSTCC Press.

Gubbi, J., Buyya, R., Marusic, S., and Palaniswami, M. (2013). Internet of things (iot): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7):1645-1660.

Li, S., Da Xu, L., and Zhao, S. (2014). The internet of things: a survey. Information Systems Frontiers, pages 1-17.

Lin, X. (2013). Lsr: mitigating zero-day sybil vulnerability in privacy-preserving vehicular peer-to-peer networks. Selected Areas in Communications, IEEE Journal on, 31(9):237-246.

Park, S., Aslam, B., Turgut, D., and Zou, C. C. (2013). Defense against sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Security and Communication Networks, 6(4):523-538.

Quercia, D. and Hailes, S. (2010). Sybil attacks against mobile users: friends and foes to the rescue. In INFOCOM, 2010 Proceedings IEEE, pages 1-5. IEEE.

Rani, R., Dolly, M. P., and Kumar, M. D. (2015). Black hole prevention & detection under average energy consumption in wsn.

Shivlal, M. and Kumar, S. U. (2012). Performance analysis of secure wireless mesh networks. Research Journal of Recent Sciences ISSN, 2277:2502.

Vamsi, P. R. and Kant, K. (2014). A lightweight sybil attack detection framework for wireless sensor networks. In Contemporary Computing (IC3), 2014 Seventh International Conference on, pages 387-393. IEEE.

Wallgren, L., Raza, S., and Voigt, T. (2013). Routing attacks and countermeasures in the rpl-based internet of things. International Journal of Distributed Sensor Networks, 2013.

Wang, X., Zhang, J., Schooler, E. M., and Ion, M. (2014). Performance evaluation of attribute-based encryption: Toward data privacy in the iot. In Communications (ICC), 2014 IEEE International Conference on, pages 725-730. IEEE.

Yu, H., Kaminsky, M., Gibbons, P. B., and Flaxman, A. (2006). Sybilguard: defending against sybil attacks via social networks. In ACM SIGCOMM Computer Communication Review, volume 36, pages 267-278. ACM.
Published
2015-11-09
EVANGELISTA, Danilo; NOGUEIRA, Michele; SANTOS, Aldri. Avaliação das Técnicas de Detecção do Ataque Sybil na Disseminação de Conteúdo da Internet das Coisas. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 15. , 2015, Florianópolis. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2015 . p. 295-308. DOI: https://doi.org/10.5753/sbseg.2015.20102.

Most read articles by the same author(s)

1 2 3 > >>