Visible to the public Sybil Attack Simulation and Mitigation in UnetStack

TitleSybil Attack Simulation and Mitigation in UnetStack
Publication TypeConference Paper
Year of Publication2021
AuthorsChandavarkar, B. R., Shantanu, T K
Conference Name2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)
Keywordscomposability, Metrics, Mitigation strategy, Oceans, Prediction algorithms, Protocols, pubcrawl, resilience, Resiliency, Routing, Sea measurements, security, Sybil attack, sybil attacks, threat mitigation, Underwater acoustic sensor network(UASN), UnetStack, Water pollution

Underwater networks have the potential to enable unexplored applications and to enhance our ability to observe and predict the ocean. Underwater acoustic sensor networks (UASNs) are often deployed in unprecedented and hostile waters and face many security threats. Applications based on UASNs such as coastal defense, pollution monitoring, assisted navigation to name a few, require secure communication. A new set of communication protocols and cooperative coordination algorithms have been proposed to enable collaborative monitoring tasks. However, such protocols overlook security as a key performance indicator. Spoofing, altering, or replaying routing information can affect the entire network, making UASN vulnerable to routing attacks such as selective forwarding, sinkhole attack, Sybil attack, acknowledgement spoofing and HELLO flood attack. The lack of security against such threats is startling if maintained that security is indeed an important requirement in many emerging civilian and military applications. In this work, we look at one of the most prevalent attacks among UASNs which is Sybill attack and discuss mitigation approaches for it. Then, feasibly implemented the attack in UnetStack3 to simulate real-life scenario.

Citation Keychandavarkar_sybil_2021