Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks

Seda Dogan-Tusha, Saud Althunibat, Marwa Qaraqe*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The rapid growth of Internet of Things (IoT) networks brings new security challenges for service providers. Due to the resource constrained nature of IoT networks, conventional security methods are not always suitable. Therefore, physical layer security (PLS) has come to the forefront, providing a high level of security while respecting the limited resources of IoTs. A Sybil attack is an insider attack in which a malicious node illegitimately fakes multiple identities, to impersonate legitimate nodes in the IoT network. This study introduces a novel Sybil attack detection scheme for mobile IoT networks that corresponds to time-varying channel. doppler-shift caused by mobile IoT nodes is considered as a novel detection metric to identify available Sybil attacks. The proposed scheme is analyzed by both the true positive rate and the false positive rate, which are mathematically formulated to verify the simulation results. Results demonstrate that as the randomness in the mobility pattern of IoT nodes increases, the proposed detection mechanism based on doppler-shift offers improved identification of the Sybil nodes. Moreover, this work provides receiver operating characteristics (RoCs) for mobile IoT networks to evaluate the effect of different system parameters, including carrier frequency, velocity, subcarrier spacing (SCS), and the size of cyclic prefix (CP). The performance of the proposed scheme improves with an increase in both the carrier frequency and velocity, as the doppler-shift becomes more pronounced.

Original languageEnglish
Pages (from-to)1136-1147
Number of pages12
JournalIEEE Internet of Things Journal
Volume11
Issue number1
DOIs
Publication statusPublished - 1 Jan 2024

Keywords

  • Doppler shift
  • Malicious node
  • Novel detection model
  • Sybil attack
  • mobile Internet of Things (IoT) networks

Fingerprint

Dive into the research topics of 'Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks'. Together they form a unique fingerprint.

Cite this