Sybil Attacks and Their Defenses in the Internet of Things

Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen
2014 IEEE Internet of Things Journal  
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks: SA-1, SA-2, and SA-3 according to the Sybil attacker's capabilities. We then present some Sybil defense schemes, including social graph-based Sybil detection
more » ... ), behavior classification-based Sybil detection (BCSD), and mobile Sybil detection with the comprehensive comparisons. Finally, we discuss the challenging research issues and future directions for Sybil defense in IoT. Index Terms-Behavior classification, Internet of Things (IoT), mobile social network, social network, Sybil attack.
doi:10.1109/jiot.2014.2344013 fatcat:lvq4u25hnzewnfvuf6nxqzu4oa