Abstract
As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Authentication or identity management systems that prevent users from setting up arbitrary numbers of nodes are often missing in MANETs. As a result, attackers are able to introduce nodes with a multitude of identities into the network, thereby controlling a substantial fraction of the system and undermining its functionality and security. Additionally, MANETs are often partitioned and lack Internet access. As a result, implementing conventional measures based on central authorities is difficult. This paper fills the gap by introducing a decentralized blockchain-based identity system called Unchained. Unchained binds identities of nodes to addresses on a blockchain and economically disincentivizes the production of spurious identities by raising the costs of placing large numbers of Sybil identities in a network. Care is taken to ensure that circumventing Unchained results in costs similar or higher than following the protocol. We describe an offline verification scheme, detail the functionalities of the concept, discuss upper- and lower-bounds of security guarantees and evaluate Unchained based on case-studies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mining - Bitcoin Wiki. https://en.bitcoin.it/w/index.php?title=Mining&oldid=64115#Reward. Accessed 11 Dec 2017
Transaction - Bitcoin Wiki. https://en.bitcoin.it/w/index.php?title=Transaction&oldid=63712. Accessed 11 Dec 2017
Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K.: Lightweight sybil attack detection in MANETs. IEEE Syst. J. 7(2), 236–248 (2013)
Bitcoin Project: Bitcoin Developer Guide (2017). https://bitcoin.org/en/developer-guide#proof-of-work. Accessed 18 Dec 2017
Bitcoincharts: Bitcoincharts API, Price data (MtGox, BTC-e, BitStamp, Coinbase). https://api.bitcoincharts.com/v1/csv/. Accessed 29 Nov 2017
Blockchain.info: Bitcoin Blockchain, Difficulty. https://api.blockchain.info/charts/difficulty?format=csv. Accessed 29 Nov 2017
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104–121, May 2015
Bussmann, O.: The future of finance: fintech, tech disruption, and orchestrating innovation. In: Francioni, R., Schwartz, R.A. (eds.) Equity Markets in Transition: The Value Chain, Price Discovery, Regulation, and Beyond, pp. 473–486. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-45848-9_19
Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)
Dai, P., Mahi, N., Earls, J., Norta, A.: Smart-contract value-transfer protocols on a distributed mobile application platform (2017). https://qtum.org/uploads/files/a2772efe4dc8ed1100319c6480195fb1.pdf. Accessed 22 Nov 2017
Dhamodharan, U.S.R.K., Vayanaperumal, R.: Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci. World J. 2015 (2015)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24
Ethereum Team: Byzantium HF Announcement (2017). https://blog.ethereum.org/2017/10/12/byzantium-hf-announcement/. Accessed 30 Nov 2017
Etherscan: Ethereum Charts and Statistics (2017). https://etherscan.io/charts. Accessed 30 Nov 2017
Horst, H.A., Miller, D.: Digital Anthropology. A&C Black, London (2013)
John, R., Cherian, J.P., Kizhakkethottam, J.J.: A survey of techniques to prevent sybil attacks. In: 2015 International Conference on Soft-Computing and Networks Security (ICSNS), pp. 1–6. IEEE (2015)
Leiding, B., Cap, C.H., Mundt, T., Rashidibajgan, S.: Authcoin: validation and authentication in decentralized networks. In: The 10th Mediterranean Conference on Information Systems - MCIS 2016, Cyprus, CY, September 2016
Leiding, B., Memarmoshrefi, P., Hogrefe, D.: Self-managed and blockchain-based vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 137–140. ACM (2016)
Macker, J.: Mobile ad-hoc networking (MANET): routing protocol performance issues and evaluation considerations, RFC 2501 (1999)
McCorry, P., Shahandashti, S.F., Clarke, D., Hao, F.: Authenticated key exchange over bitcoin. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 3–20. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27152-1_1
van der Meulen, R.: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016 (2017). https://www.gartner.com/newsroom/id/3598917. Accessed 01 Nov 2017
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf. Accessed 26 Jan 2017
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268. ACM (2004)
Nguyen, Q.K.: Blockchain - a financial technology for future sustainable development. In: International Conference on Green Technology and Sustainable Development (GTSD), pp. 51–54. IEEE (2016)
Nordrum, A.: Popular internet of things forecast of 50 billion devices by 2020 is outdated (2016). https://spectrum.ieee.org/tech-talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated. Accessed 01 Nov 2017
Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds.) Europe and MENA Cooperation Advances in Information and Communication Technologies. AISC, vol. 520, pp. 523–533. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46568-5_53
Popov, S.: The Tangle - Version 1.3 (2017). https://iota.org/IOTA_Whitepaper.pdf. Accessed 22 Nov 2017
Raza, N., Aftab, M.U., Akbar, M.Q., Ashraf, O., Irfan, M.: Mobile ad-hoc networks applications and its challenges (2016)
Su, K., Li, J., Fu, H.: Smart city and the applications. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 1028–1031. IEEE (2011)
Tangpong, A., Kesidis, G., Hsu, H.Y., Hurson, A.: Robust sybil detection for MANETs. In: 2009 Proceedings of 18th International Conference on Computer Communications and Networks, ICCCN 2009, pp. 1–6. IEEE (2009)
Todd, P.: BIP 65 - OP\(\_\)CHECKLOCKTIMEVERIFY (2014). https://github.com/bitcoin/bips/blob/6295c1a095a1fa33f38d334227fa4222d8e0a523/bip-0009.mediawiki. Accessed 11 Dec 2017
Wood, G.: Ethereum: a secure decrentralized generalised transaction ledger (2014). http://gavwood.com/paper.pdf. Accessed 22 Nov 2017
Xiao, B., Yu, B., Gao, C.: Detection and localization of sybil nodes in VANETs. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks And Sensor Networks, pp. 1–8. ACM (2006)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against sybil attacks. In: 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 3–17. IEEE (2008)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. In: ACM SIGCOMM Computer Communication Review, vol. 36, pp. 267–278. ACM (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Bochem, A., Leiding, B., Hogrefe, D. (2018). Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds) Security and Privacy in Communication Networks. SecureComm 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 254. Springer, Cham. https://doi.org/10.1007/978-3-030-01701-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-01701-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-01700-2
Online ISBN: 978-3-030-01701-9
eBook Packages: Computer ScienceComputer Science (R0)