Visible to the public Sybil attack in IOT: Modelling and defenses

TitleSybil attack in IOT: Modelling and defenses
Publication TypeConference Paper
Year of Publication2017
AuthorsRajan, A., Jithish, J., Sankaran, S.
Conference Name2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
Keywordsad hoc on-demand distance vector, AODV, behavioural profiling, composability, computer network security, defense mechanism, delays, EAODV, EAODV protocol, enhanced AODV protocol, information technology, Internet of Things, IoT network, legitimate nodes, Metrics, neighbouring nodes, Peer-to-peer computing, pubcrawl, Resiliency, Routing, Routing protocols, security, sybil attacks, sybil nodes, Throughput, trust value

Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact on performance. We also develop a defense mechanism based on behavioural profiling of nodes. We develop an enhanced AODV (EAODV) protocol by using the behaviour approach to obtain the optimal routes. In EAODV, the routes are selected based on the trust value and hop count. Sybil nodes are identified and discarded based on the feedback from neighbouring nodes. Evaluation of our protocol in ns-2 simulator demonstrates the effectiveness of our approach in identifying and detecting sybil nodes in IoT network.

Citation Keyrajan_sybil_2017