Analytical Model for Sybil Attack Phases in Internet of Things

  • Alekha Kumar Mishra
  • , Asis Kumar Tripathy
  • , Deepak Puthal
  • , Laurence T. Yang

Research output: Contribution to journalArticlepeer-review

74 Scopus citations

Abstract

The sybil attack in Internet of Things (IoT) commonly aims the sensing domain that may impose serious threat to the devices both in perception and communication layer. The singularity of the sybil attack is a sybil node that publish multiple identities of legitimate devices. It is highly essential to learn the behavior and predict possible actions of a sybil attacker while devising a defense mechanism for it. This paper provides a comprehensive characteristic analysis of sybil attack in IoT. Based on the nature of the task performed during this attack, it is classified into three phases as compromise, deployment, and launching phase. The compromise phase is modeled as an automaton with attacker state transition as a Markov chain model. A heuristic is also proposed for selection criteria of an attacker to compromise a node. In the deployment phase of the attack, an algorithm based on K -mean clustering is proposed to group compromised identities and deploy the sybil node for corresponding identities without violating the set of adjacent nodes. In the launching phase, the process of replacing sybil identities either over time or on detection is modeled using age replacement policy. The results depict that the proposed model effectively visualize the behavior of a sybil attacker in challenging environments of IoT.

Original languageBritish English
Article number8371597
Pages (from-to)379-387
Number of pages9
JournalIEEE Internet of Things Journal
Volume6
Issue number1
DOIs
StatePublished - Feb 2019

Keywords

  • Attacker model
  • identity replacement policy
  • Internet of Things (IoT)
  • node compromise
  • security threats
  • sensing domain
  • sybil

Fingerprint

Dive into the research topics of 'Analytical Model for Sybil Attack Phases in Internet of Things'. Together they form a unique fingerprint.

Cite this