DocumentCode :
3017487
Title :
Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks
Author :
Hashmi, Sarosh ; Brooke, John
Author_Institution :
Sch. of Comput. Sci., Univ. of Manchester, Manchester, UK
fYear :
2010
fDate :
18-25 July 2010
Firstpage :
17
Lastpage :
24
Abstract :
In Sybil attack, an attacker acquires multiple identities and uses them simultaneously or one by one to attack network operations. Such attacks pose a serious threat to the security of self-organized networks like Mobile Ad hoc Networks (MANETs) that require unique and unchangeable identity per node for detecting routing misbehavior and reliable computation of node´s reputation. Current authentication mechanisms for MANETs are vulnerable to Sybil attack unless they resort to some out of band method like physical contact between nodes for building trust or relying on a Trusted Third Party (TTP) for issuing a unique and unchangeable identity to each node. In this paper we present an authentication mechanism for MANETs that utilizes hardware id of the device of each node for authentication. An authentication agent is developed that verifies the hardware id of the authenticatee node. A comprehensive defense model is employed to protect the authentication agent from various static and dynamic attacks from a potentially malicious authenticatee node. Security of authenticatee node is assured by involving a TTP that signs the authentication agent, verifying that it will perform only intended function and is safe to execute. With this minimal involvement of the TTP, the proposed authentication scheme offers increased resistance to the Sybil attack. The attacker is now required to either thwart agent protection mechanisms or to acquire multiple devices with different hardware ids, in order to gain multiple identities.
Keywords :
ad hoc networks; authorisation; mobile communication; telecommunication security; Sybil attack; Sybil resistant authentication; authentication agent; defense model; dynamic attacks; mobile ad hoc networks; network operations; self-organized networks; static attacks; trusted third party; Ad hoc networks; Authentication; Hardware; Mobile computing; Peer to peer computing; Resistance; Authentication; Mobile Ad hoc Networks; Software agents; Sybil attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Emerging Security Information Systems and Technologies (SECURWARE), 2010 Fourth International Conference on
Conference_Location :
Venice
Print_ISBN :
978-1-4244-7517-9
Electronic_ISBN :
978-0-7695-4095-5
Type :
conf
DOI :
10.1109/SECURWARE.2010.11
Filename :
5631803
Link To Document :
بازگشت