Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information
Tóm tắt
Từ khóa
Tài liệu tham khảo
Mitchell, C. (2005, January 3–4). Security Analysis and Improvements for IEEE 802.11 i. Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS’05), San Diego, CA, USA.
Douceur, J.R. (2002, January 7–8). The Sybil attack. Proceedings of the International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA.
Zhang, 2016, Optimal DoS attack scheduling in wireless networked control system, IEEE Trans. Control Syst. Technol., 24, 843, 10.1109/TCST.2015.2462741
Demirbas, M., and Song, Y. (2006, January 26–29). An RSSI-based scheme for Sybil attack detection in wireless sensor networks. Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, Buffalo NY, USA.
Wang, J., Yang, G., Sun, Y., and Chen, S. (2007, January 21–25). Sybil attack detection based on RSSI for wireless sensor network. Proceedings of the IEEE International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, Shanghai, China.
Jan, M.A., Nanda, P., He, X., and Liu, R.P. (2015, January 20–22). A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network. Proceedings of the IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland.
Garip, M.T., Kim, P.H., Reiher, P., and Gerla, M. (2017, January 8–11). INTERLOC: An interference-aware RSSI-based localization and Sybil attack detection mechanism for vehicular ad hoc networks. Proceedings of the IEEE 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA.
Deak, 2010, Filters for RSSI-based measurements in a Device-free Passive Localisation Scenario, Image Process. Commun., 15, 23
Vasisht, D., Kumar, S., and Katabi, D. (2016, January 16–18). Decimeter-Level Localization with a Single WiFi Access Point. Proceedings of the NSDI, Santa Clara, CA, USA.
Kotaru, 2015, Spotfi: Decimeter level localization using wifi, Proceedings of the ACM SIGCOMM Computer Communication Review, Volume 45, 269, 10.1145/2829988.2787487
Wang, 2018, Channel State Information-Based Detection of Sybil Attacks in Wireless Networks, J. Internet Serv. Inf. Secur., 8, 2
Sen, S., Radunovic, B., Choudhury, R.R., and Minka, T. (2012, January 25–29). You are facing the Mona Lisa: Spot localization using PHY layer information. Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Lake District, UK.
Zhang, 2010, Through-the-wall target localization with time reversal music method, Prog. Electromagn. Res., 106, 75, 10.2528/PIER10052408
Gjengset, J., Xiong, J., McPhillips, G., and Jamieson, K. (2014, January 7–11). Phaser: Enabling phased array signal processing on commodity WiFi access points. Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, Maui, HI, USA.
Gan, J., and Tao, Y. (June, January 31). DBSCAN Revisited. Proceedings of the ACM SIGMOD International Conference, Melbourne, Australia.
Karlof, 2003, Secure routing in wireless sensor networks: Attacks and countermeasures, Ad Hoc Netw., 1, 293, 10.1016/S1570-8705(03)00008-8
Newsome, J., Shi, E., Song, D., and Perrig, A. (2004, January 26–27). The Sybil attack in sensor networks: Analysis & defences. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA.
Zhang, 2006, Location-based compromise-tolerant security mechanisms for wireless sensor networks, IEEE J. Sel. Areas Commun., 24, 247, 10.1109/JSAC.2005.861382
Dhamodharan, U.S.R.K., and Vayanaperumal, R. (2015). Detecting and preventing Sybil attacks in wireless sensor networks using message authentication and passing method. Sci. World J., 2015.
Pecori, 2016, 3AKEP: Triple-Authenticated Key Exchange Protocol for Peer-to-Peer VoIP Applications, Comput. Commun., 85, 28, 10.1016/j.comcom.2016.04.005
Pecori, 2016, S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia, Comput. Netw., 94, 205, 10.1016/j.comnet.2015.11.010
Ishida, 2017, Implementation of an Integrated Disaster Information Cloud System for Disaster Control, J. Internet Serv. Inf. Secur., 7, 1
Cui, 2016, Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage, IEEE Trans. Comput., 65, 2374, 10.1109/TC.2015.2389959
Liu, 2016, New order preserving encryption model for outsourced databases in cloud environments, J. Netw. Comput. Appl., 59, 198, 10.1016/j.jnca.2014.07.001
Liu, 2018, Verifiable searchable encryption with aggregate keys for data sharing system, Future Gener. Comput. Syst., 78, 778, 10.1016/j.future.2017.02.024
Liu, Z., Huang, Y., Li, J., Cheng, X., and Shen, C. (2018). DivORAM: Towards a Practical Oblivious RAM with Variable Block Size. Information Sciences. Inf. Sci., 447.
Xu, 2016, Device fingerprinting in wireless networks: Challenges and opportunities, IEEE Commun. Surv. Tutor., 18, 94, 10.1109/COMST.2015.2476338
Park, 2013, Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support, Secur. Commun. Netw., 6, 523, 10.1002/sec.679
Shen, 2016, A lightweight multi-layer authentication protocol for wireless body area networks, Future Gener. Comput. Syst., 78, 956, 10.1016/j.future.2016.11.033
Shi, W., Liu, S., and Zhang, Z. (2015). A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network. KSII Trans. Internet Inf. Syst., 9.
Gu, P., Khatoun, R., Begriche, Y., and Serhrouchni, A. (2017, January 11–12). k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks. Proceedings of the IEEE 2017 Third International Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA.
Gu, P., Khatoun, R., Begriche, Y., and Serhrouchni, A. (2017, January 19–22). Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks. Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA.
Wen, 2008, TDOA-based Sybil attack detection scheme for wireless sensor networks, J. Shanghai Univ., 12, 66, 10.1007/s11741-008-0113-2
Zhang, 2010, AOA based trust evaluation scheme for Sybil attack detection in WSN, Appl. Res. Comput., 27, 1847
Yu, 2013, Detecting Sybil attacks in VANETs, J. Parallel Distrib. Comput., 73, 746, 10.1016/j.jpdc.2013.02.001
Liu, 2015, The Mason test: A defence against Sybil attacks in wireless networks without trusted authorities, IEEE Trans. Mob. Comput., 14, 2376, 10.1109/TMC.2015.2398425
Feng, X., Li, C.Y., Chen, D.X., and Tang, J. (2015). EBRS: Event Based Reputation System for Defensing Multi-Source Sybil Attacks in VANET, Springer International Publishing.
Liu, R., and Wang, Y. (2014, January 15–16). A New Sybil Attack Detection for Wireless Body Sensor Network. Proceedings of the Tenth International Conference on Computational Intelligence and Security, Kunming, China.
Xiao, 2009, Channel-based detection of Sybil attacks in wireless networks, IEEE Trans. Inf. Forensics Secur., 4, 492, 10.1109/TIFS.2009.2026454
Zhang, 2017, Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks, Int. J. Sens. Netw., 23, 248, 10.1504/IJSNET.2017.083533
Zhang, 2016, Efficient algorithm for k-barrier coverage based on integer linear programming, China Commun., 13, 16, 10.1109/CC.2016.7489970
Jamshidi, 2016, A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks, Comput. Electr. Eng., 64, 220, 10.1016/j.compeleceng.2016.12.011
Schmidt, 1986, Multiple emitter location and signal parameter estimation, IEEE Trans. Antennas Propag., 34, 276, 10.1109/TAP.1986.1143830
Xiong, J., and Jamieson, K. (2013). Arraytrack: A Fine-Grained Indoor Location System, USENIX.
Wang, 2017, Device-Free Human Activity Recognition Using Commercial WiFi Devices, IEEE J. Sel. Areas Commun., 35, 1118, 10.1109/JSAC.2017.2679658