DocumentCode
3769
Title
Sybil Attacks and Their Defenses in the Internet of Things
Author
Kuan Zhang ; Xiaohui Liang ; Rongxing Lu ; Xuemin Shen
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
Volume
1
Issue
5
fYear
2014
fDate
Oct. 2014
Firstpage
372
Lastpage
383
Abstract
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker´s capabilities. We then present some Sybil defense schemes, including social graph-based Sybil detection (SGSD), behavior classification-based Sybil detection (BCSD), and mobile Sybil detection with the comprehensive comparisons. Finally, we discuss the challenging research issues and future directions for Sybil defense in IoT.
Keywords
Internet of Things; computer network security; graph theory; mobile computing; pattern classification; BCSD; Internet-of-Things; IoT; SA-1 Sybil attacks; SA-2 Sybil attacks; SA-3 Sybil attacks; SGSD; Sybil attacker capabilities; Sybil defense schemes; abuse pseudoidentities; behavior classification-based Sybil detection; defense schemes; fake identities; mobile Sybil detection; social graph-based Sybil detection; Computer security; Mobile communication; Mobile computing; Network security; Social network services; Ubiquitous computing; Behavior classification; Internet of Things (IoT); Sybil attack; mobile social network; social network;
fLanguage
English
Journal_Title
Internet of Things Journal, IEEE
Publisher
ieee
ISSN
2327-4662
Type
jour
DOI
10.1109/JIOT.2014.2344013
Filename
6868197
Link To Document