TY - JOUR
T1 - Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks
AU - Dogan-Tusha, Seda
AU - Althunibat, Saud
AU - Qaraqe, Marwa
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2024/1/1
Y1 - 2024/1/1
N2 - The rapid growth of Internet of Things (IoT) networks brings new security challenges for service providers. Due to the resource constrained nature of IoT networks, conventional security methods are not always suitable. Therefore, physical layer security (PLS) has come to the forefront, providing a high level of security while respecting the limited resources of IoTs. A Sybil attack is an insider attack in which a malicious node illegitimately fakes multiple identities, to impersonate legitimate nodes in the IoT network. This study introduces a novel Sybil attack detection scheme for mobile IoT networks that corresponds to time-varying channel. doppler-shift caused by mobile IoT nodes is considered as a novel detection metric to identify available Sybil attacks. The proposed scheme is analyzed by both the true positive rate and the false positive rate, which are mathematically formulated to verify the simulation results. Results demonstrate that as the randomness in the mobility pattern of IoT nodes increases, the proposed detection mechanism based on doppler-shift offers improved identification of the Sybil nodes. Moreover, this work provides receiver operating characteristics (RoCs) for mobile IoT networks to evaluate the effect of different system parameters, including carrier frequency, velocity, subcarrier spacing (SCS), and the size of cyclic prefix (CP). The performance of the proposed scheme improves with an increase in both the carrier frequency and velocity, as the doppler-shift becomes more pronounced.
AB - The rapid growth of Internet of Things (IoT) networks brings new security challenges for service providers. Due to the resource constrained nature of IoT networks, conventional security methods are not always suitable. Therefore, physical layer security (PLS) has come to the forefront, providing a high level of security while respecting the limited resources of IoTs. A Sybil attack is an insider attack in which a malicious node illegitimately fakes multiple identities, to impersonate legitimate nodes in the IoT network. This study introduces a novel Sybil attack detection scheme for mobile IoT networks that corresponds to time-varying channel. doppler-shift caused by mobile IoT nodes is considered as a novel detection metric to identify available Sybil attacks. The proposed scheme is analyzed by both the true positive rate and the false positive rate, which are mathematically formulated to verify the simulation results. Results demonstrate that as the randomness in the mobility pattern of IoT nodes increases, the proposed detection mechanism based on doppler-shift offers improved identification of the Sybil nodes. Moreover, this work provides receiver operating characteristics (RoCs) for mobile IoT networks to evaluate the effect of different system parameters, including carrier frequency, velocity, subcarrier spacing (SCS), and the size of cyclic prefix (CP). The performance of the proposed scheme improves with an increase in both the carrier frequency and velocity, as the doppler-shift becomes more pronounced.
KW - Doppler shift
KW - Malicious node
KW - Novel detection model
KW - Sybil attack
KW - mobile Internet of Things (IoT) networks
UR - http://www.scopus.com/inward/record.url?scp=85162894215&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2023.3288040
DO - 10.1109/JIOT.2023.3288040
M3 - Article
AN - SCOPUS:85162894215
SN - 2327-4662
VL - 11
SP - 1136
EP - 1147
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 1
ER -