Back close

Sybil attack in IOT: Modelling and defenses

Publication Type : Conference Proceedings

Thematic Areas : Amrita Center for Cybersecurity Systems and Networks

Publisher : 2017 International Conference on Advances in Computing, Communications and Informatics

Source : 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, Udupi, India (2017)

Url : https://www.scopus.com/record/display.uri?eid=2-s2.0-85042668861&origin=resultslist&sort=plf-f&src=s&sid=a8f73ff31047ba959d38d874c6453979&sot=autdocs&sdt=autdocs&sl=18&s=AU-ID%2856021058900%29&relpos=6&citeCnt=0&searchTerm=

Keywords : ad hoc on-demand distance vector, AODV, Behavioural profiling, computer network security, defense mechanism, Delays, EAODV, EAODV protocol, enhanced AODV protocol, Information technology, Internet of things, IoT network, legitimate nodes, neighbouring nodes, peer-to-peer computing, routing, Routing protocols, Security, Sybil Attack, Sybil attacks, sybil nodes, Throughput, trust value

Campus : Amritapuri

School : Centre for Cybersecurity Systems and Networks, School of Engineering

Center : Cyber Security

Department : cyber Security

Year : 2017

Abstract : Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact on performance. We also develop a defense mechanism based on behavioural profiling of nodes. We develop an enhanced AODV (EAODV) protocol by using the behaviour approach to obtain the optimal routes. In EAODV, the routes are selected based on the trust value and hop count. Sybil nodes are identified and discarded based on the feedback from neighbouring nodes. Evaluation of our protocol in ns-2 simulator demonstrates the effectiveness of our approach in identifying and detecting sybil nodes in IoT network.

Cite this Research Publication : A. Rajan, Jithish, J., and Sankaran, S., “Sybil attack in IOT: Modelling and defenses”, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, Udupi, India, 2017.

Admissions Apply Now