Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2462096.2462125acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Countermeasures against sybil attacks in WSN based on proofs-of-work

Published: 17 April 2013 Publication History

Abstract

It has been shown that Sybil attack -- forging identities in order to gain disproportional influence on a distributed system -- can be easily applied in Wireless Sensor Networks (WSN). An adversary capturing a few stations can corrupt most of classic protocols (e.g. leader election procedures) in most of considered models. Moreover, such attack is in practice undetectable in many realistic scenarios. In this paper we present an efficient countermeasure against Sybil attack. It is based on Proofs-of-Work technique -- one of the methods of preventing sending spam. In contrast to previous solutions it is based only on limited computational power of the adversarial devices. Our approach does not require any restrictions on communication between adversarial stations.

References

[1]
A. Back. Hashcash - a denial of service counter-measure. Technical report, 2002.
[2]
J. L. Bordim, Y. Ito, and K. Nakano. Randomized leader election protocols in noisy radio networks with a single transceiver. In M. Guo, L. T. Yang, B. D. Martino, H. P. Zima, J. Dongarra, and F. Tang, editors, ISPA, volume 4330 of Lecture Notes in Computer Science, pages 246{256. Springer, 2006.
[3]
C. S. Brian Neil Levine and N. B. Margolin. A survey of solutions to the sybil attack, 2006.
[4]
F. Coelho. Exponential memory-bound functions for proof of work protocols, 2005.
[5]
B. L. C.Piro, C.Shields. Detecting the sybil attack in ad hoc networks. In Proc. IEEE/ACM SecureComm, pages 1--11, 2006.
[6]
J. Czyzowicz, L. Gasieniec, D. R. Kowalski, and A. Pelc. Consensus and mutual exclusion in a multiple access channel. IEEE Trans. Parallel Distrib. Syst., 22(7):1092--1104, 2011.
[7]
S. Delaët, P. S. Mandal, M. A. Rokicki, and S. Tixeuil. Deterministic secure positioning in wireless sensor networks. Theor. Comput. Sci., 412(35):4471--4481, 2011.
[8]
S. Dolev, S. Gilbert, R. Guerraoui, and C. C. Newport. Secure communication over radio channels. In R. A. Bazzi and B. Patt-Shamir, editors, PODC, pages 105--114. ACM, 2008.
[9]
J. R. Douceur. The sybil attack. In IPTPS, pages 251--260, 2002.
[10]
C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In E. F. Brickell, editor, CRYPTO, volume 740 of Lecture Notes in Computer Science, pages 139--147. Springer, 1992.
[11]
V. Geffert, J. Karhumaki, A. Bertoni, B. Preneel, P. Navrat, and M. Bielikova, editors. SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Novy Smokovec, Slovakia, January 19-25, 2008, Proceedings, volume 4910 of Lecture Notes in Computer Science. Springer, 2008.
[12]
S. Gilbert, R. Guerraoui, D. Kowalski, and C. Newport. Interference-Resilient Information Exchange. In IEEE InfoCom 2009, 2009.
[13]
Z. Golebiewski, M. Klonowski, M. Koza, and M. Kutylowski. Towards fair leader election in wireless networks. In P. M. Ruiz and J. J. Garcia-Luna-Aceves, editors, ADHOC-NOW, volume 5793 of Lecture Notes in Computer Science, pages 166--179. Springer, 2009.
[14]
T. Hayashi, K. Nakano, and S. Olariu. Randomized initialization protocols for packet radio networks. In IPPS/SPDP, pages 544--. IEEE Computer Society, 1999.
[15]
A. Juels, R. L. Rivest, and M. Szydlo. The blocker tag: selective blocking of rfid tags for consumer privacy. In S. Jajodia, V. Atluri, and T. Jaeger, editors, ACM Conference on Computer and Communications Security, pages 103--111. ACM, 2003.
[16]
M. Klonowski, M. Koza, and M. Kutylowski. Repelling sybil-type attacks in wireless ad hoc systems. In ACISP, 2010.
[17]
M. Klonowski and T. Struminski. Proofs of communication and its application for fighting spam. In Geffert et al. {11}, pages 720--730.
[18]
M. Klonowski and T. Struminski. Proofs of communication and its application for fighting spam. In Geffert et al. {11}, pages 720--730.
[19]
M. Kuty lowski and W. Rutkowski. Adversary immune leader election in ad hoc radio networks. In G. D. Battista and U. Zwick, editors, ESA, volume 2832 of Lecture Notes in Computer Science, pages 397--408. Springer, 2003.
[20]
M. Kuty lowski and W. Rutkowski. Secure initialization in single-hop radio networks. In C. Castelluccia, H. Hartenstein, C. Paar, and D. Westhoff, editors, ESAS, volume 3313 of Lecture Notes in Computer Science, pages 31--41. Springer, 2004.
[21]
A. MacKenzie and S. B. Wicker. Stability of multipacket slotted aloha with selfish users and perfect information. In INFOCOM, 2003.
[22]
R. M. Metcalfe and D. R. Boggs. Ethernet: distributed packet switching for local computer networks. Commun. ACM, 19(7):395--404, 1976.
[23]
K. Nakano and S. Olariu. Randomized o (log log n)-round leader election protocols in packet radio networks. In K.-Y. Chwa and O. H. Ibarra, editors, ISAAC, volume 1533 of Lecture Notes in Computer Science, pages 209--218. Springer, 1998.
[24]
K. Nakano and S. Olariu. Randomized leader election protocols in radio networks with no collision detection. In D. T. Lee and S.-H. Teng, editors, ISAAC, volume 1969 of Lecture Notes in Computer Science, pages 362--373. Springer, 2000.
[25]
J. Newsome, E. Shi, D. X. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, editors, IPSN, pages 259--268. ACM, 2004.
[26]
A. Perrig, J. A. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM, 47(6):53--57, 2004.
[27]
D. E. Willard. Log-logarithmic selection resolution protocols in a multiple access channel. SIAM J. Comput., 15(2):468--477, 1986.

Cited By

View all
  • (2022)STBC: A Novel Blockchain-Based Spectrum Trading SolutionIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2021.30864908:1(13-30)Online publication date: Mar-2022
  • (2021)Social-ChainACM Transactions on Internet Technology10.1145/341910221:1(1-28)Online publication date: Feb-2021
  • (2018)Proof of Work Without All the WorkProceedings of the 19th International Conference on Distributed Computing and Networking10.1145/3154273.3154333(1-10)Online publication date: 4-Jan-2018
  • Show More Cited By

Index Terms

  1. Countermeasures against sybil attacks in WSN based on proofs-of-work

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
    April 2013
    230 pages
    ISBN:9781450319980
    DOI:10.1145/2462096
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 April 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. adversary
    2. leader election
    3. proof of work

    Qualifiers

    • Research-article

    Conference

    WISEC'13
    Sponsor:

    Acceptance Rates

    WiSec '13 Paper Acceptance Rate 26 of 70 submissions, 37%;
    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)STBC: A Novel Blockchain-Based Spectrum Trading SolutionIEEE Transactions on Cognitive Communications and Networking10.1109/TCCN.2021.30864908:1(13-30)Online publication date: Mar-2022
    • (2021)Social-ChainACM Transactions on Internet Technology10.1145/341910221:1(1-28)Online publication date: Feb-2021
    • (2018)Proof of Work Without All the WorkProceedings of the 19th International Conference on Distributed Computing and Networking10.1145/3154273.3154333(1-10)Online publication date: 4-Jan-2018
    • (2017)Who are you? Secure identities in single hop ad hoc networksDistributed Computing10.1007/s00446-016-0280-030:2(103-125)Online publication date: 1-Apr-2017
    • (2014)Towards Robust and Effective Trust Management for SecurityProceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2014.65(511-518)Online publication date: 24-Sep-2014
    • (2014)Who Are You? Secure Identities in Ad Hoc NetworksDistributed Computing10.1007/978-3-662-45174-8_16(227-242)Online publication date: 2014

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media