Skip to main content

Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks

  • Conference paper
Stabilization, Safety, and Security of Distributed Systems (SSS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5340))

Included in the following conference series:

Abstract

The Sybil attack in unknown port networks such as wireless is not considered tractable. A wireless node is not capable of independently differentiating the universe of real nodes from the universe of arbitrary non-existent fictitious nodes created by the attacker. Similar to failure detectors, we propose to use universe detectors to help nodes determine which universe is real. In this paper, we (i) define several variants of the neighborhood discovery problem under Sybil attack (ii) propose a set of matching universe detectors (iii) demonstrate the necessity of additional topological constraints for the problems to be solvable: node density and communication range; (iv) present \(\cal SAND\) — an algorithm that solves these problems with the help of appropriate universe detectors, this solution demonstrates that the proposed universe detectors are the weakest detectors possible for each problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Douceur, J.: The sybil attack. In: IPTPS, Cambridge, MA, March 2002, vol. 1, pp. 251–260 (2002)

    Google Scholar 

  2. Wood, A., Stankovic, J.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  3. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3), 293–315 (2003)

    Article  Google Scholar 

  4. Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Transactions on Programming Languages and Systems 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  5. Deng, J., Han, R., Mishra, S.: Security support for in-network processing in wireless sensor networks. In: SASN, pp. 83–93 (October 2003)

    Google Scholar 

  6. Martucci, L., Kohlweiss, M., Andersson, C., Panchenko, A.: Self-certified sybil-free pseudonyms. In: The first ACM conference on Wireless network security WiSec, pp. 154–159. ACM, New York (2008)

    Chapter  Google Scholar 

  7. Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 49–63 (May 2005)

    Google Scholar 

  8. Theodorakopoulos, G., Baras, J.: On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2), 318–328 (2006)

    Article  Google Scholar 

  9. Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.: Toward resilient security in wireless sensor networks. In: MobiHoc, pp. 34–45 (May 2005)

    Google Scholar 

  10. Zhang, Q., Wang, P., Reeves, D., Ning, P.: Defending against sybil attacks in sensor networks. In: Second International Workshop on Security in Distributed Computing Systems, pp. 185–191 (June 2005)

    Google Scholar 

  11. Zhu, S., Setia, S., Jajodia, S.: LEAP - efficient security mechanisms for large-scale distributed sensor networks. In: SenSys., pp. 308–309 (November 2003)

    Google Scholar 

  12. Buchegger, S., Boudec, J.L.: A robust reputation system for mobile ad-hoc. Technical Report EPFL-IC-LCA-50, EPFL, Lausanne, Switzerland (November 11, 2003)

    Google Scholar 

  13. Cheng, A., Friedman, E.: Sybilproof reputation mechanisms. In: P2PENCON, pp. 128–132 (2005)

    Google Scholar 

  14. Jelasity, M., Montresor, A., Babaoglu, O.: Towards secure epidemics: Detection and removal of malicious peers in epidemic-style protocols. Technical Report UBLCS-2003-14, University of Bologna (December 11, 2003)

    Google Scholar 

  15. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis and defenses. In: IPSN, pp. 259–268 (April 2004)

    Google Scholar 

  16. Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications 11(6) (December 2004)

    Google Scholar 

  17. Demirbas, M., Song, Y.: An RSSI-based scheme for sybil attack detection in wireless sensor networks. In: WOWMOM, pp. 564–570 (June 2006)

    Google Scholar 

  18. Capkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 221–232 (2006)

    Article  Google Scholar 

  19. Kindberg, T., Zhang, K.: Validating and securing spontaneous associations between wireless devices. In: ISW: International Workshop on Information Security, Bristol, UK, pp. 44–53 (October 2003)

    Google Scholar 

  20. Lazos, L., Poovendran, R., Čapkun, S.: ROPE: Robust position estimation in wireless sensor networks. In: IPSN, Los Angeles, CA, pp. 324–331 (April 2005)

    Google Scholar 

  21. Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of the ACM workshop on Wireless security, San Diego, CA, pp. 1–10 (2003)

    Google Scholar 

  22. Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Transactions on Dependable and Secure Computing 3(4), 369–383 (2006)

    Article  MATH  Google Scholar 

  23. Delat, S., Mandal, P.S., Rokicki, M., Tixeuil, S.: Deterministic Secure Positioning in Wireless Sensor Networks. In: DCOSS (June 2008) (to appear)

    Google Scholar 

  24. Hwang, J., He, T., Kim, Y.: Detecting phantom nodes in wireless sensor networks. In: 26th IEEE Conference on Computer Communications InfoCom, pp. 2391–2395 (2007)

    Google Scholar 

  25. Nesterenko, M., Tixeuil, S.: Discovering network topology in the presence of byzantine faults. In: Flocchini, P., Gąsieniec, L. (eds.) SIROCCO 2006. LNCS, vol. 4056, pp. 212–226. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  26. Zhou, G., He, T., Krishnamurthy, S., Stankovic, J.: Impact of radio irregularity on wireless sensor networks. In: The 2nd International Conference on Mobile Systems, Applications, and Services MobiSys, pp. 125–138 (June 2004)

    Google Scholar 

  27. Chandra, T., Toueg, S.: Unreliable failure detectors for reliable distributed systems. Communications of the ACM 43(2), 225–267 (1996)

    MathSciNet  MATH  Google Scholar 

  28. Chandra, T., Hadzilacos, V., Toueg, S.: The weakest failure detector for solving consensus. Journal of the ACM 43(4), 685–722 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  29. Rappaport, T.: Wireless communications - Principles and Practice. Prentice-Hall, Englewood Cliffs (2002)

    MATH  Google Scholar 

  30. Vora, A., Nesterenko, M., Tixeuil, S., Delaet, S.: Universe detectors for sybil defense in ad hoc wireless networks. Technical Report No 6529, INRIA (May 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Vora, A., Nesterenko, M., Tixeuil, S., Delaët, S. (2008). Universe Detectors for Sybil Defense in Ad Hoc Wireless Networks. In: Kulkarni, S., Schiper, A. (eds) Stabilization, Safety, and Security of Distributed Systems. SSS 2008. Lecture Notes in Computer Science, vol 5340. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89335-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89335-6_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89334-9

  • Online ISBN: 978-3-540-89335-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics