A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment

11/08/2019
by   Zhengyu Wu, et al.
0

Internet of things (IoT) connects all items to the Internet through information-sensing devices to exchange information for intelligent identification and management. Sybil attack is a famous and crippling attack in IoT. Most of the previous methods of detecting Sybil attacks in IoT mainly focus on static IoT while there are very rare methods applicable to mobile IoT. In this paper, a novel, lightweight, and distributive detection scheme based on edge computing is proposed for detecting Sybil attacks in mobile IoT. In the proposed scheme, a detection consists of two rounds. In each round, member nodes are required to send packets to edge nodes. Edge nodes calculate a possible interval of the received signal strength indication (RSSI) from the first round and check whether the RSSI from the second round is in the interval to detect Sybil attack. Extensive experimental studies are included to show that the presented approach outperforms many existing approaches in terms of true detection and false detection rates. Moreover, experimental results show that the fault tolerance design in the proposed approach greatly enhances the detection scheme.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/01/2021

Data-Driven Detection and Identification of IoT-Enabled Load-Altering Attacks in Power Grids

Advances in edge computing are powering the development and deployment o...
research
04/18/2020

An Online Framework for Ephemeral Edge Computing in the Internet of Things

In the Internet of Things (IoT) environment, edge computing can be initi...
research
11/28/2020

LocKedge: Low-Complexity Cyberattack Detection in IoT Edge Computing

Internet of Things and its applications are becoming commonplace with mo...
research
08/23/2021

Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things

In a clone node attack, an attacker attempted to physically capture the ...
research
05/09/2018

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

To accommodate heterogeneous tasks in Internet of Things (IoT), a new co...
research
10/20/2021

On the Effectiveness of Clone Detection for Detecting IoT-related Vulnerable Clones

Since IoT systems provide services over the Internet, they must continue...

Please sign up or login with your details

Forgot password? Click here to reset