scholarly journals Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks

Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3257
Author(s):  
Arne Bochem ◽  
Benjamin Leiding

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.

Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1467 ◽  
Author(s):  
Waleed Alnumay ◽  
Uttam Ghosh ◽  
Pushpita Chatterjee

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. A Beta probabilistic distribution is used to combine different trust evidences and direct trust has been calculated. The theory of ARMA/GARCH has been used to combine the recommendation trust evidences and predict the resultant trust value of each node in multi-step ahead. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


2012 ◽  
Vol 424-425 ◽  
pp. 1053-1056
Author(s):  
Li Guo Qu ◽  
You Rui Huang ◽  
Chao Li Tang ◽  
Liu Yi Ling

Sensing Mine is the specific application of internet of things in mine. Through a variety of techniques of sensing, information transmission and processing, Sensing Mine realizes digital, visualization, and intelligent of true mine. Because mine is in the dynamic mining process, only WSN (wireless sensor network) with the characteristics of distributed, mobile, ad hoc network can be employed to realize mine information sensing. In this paper, low power Wi-Fi(IEEE 802.11)is adopted to constitute WSN, and the node of WSN is mainly consist of GS1010 which is WSN solutions of GainSpan company and other external sensor for mobile sensing of the mine information. Experiment results show that WSN based on Wi-Fi enhances the sensing ability of mine safety information, and provides real-time, reliable data for the mine disasters prediction


2017 ◽  
Vol 5 (1) ◽  
pp. 50-63
Author(s):  
Shailja Agnihotri ◽  
K.R. Ramkumar

The paper provides insight into various swarm intelligence based routing protocols for Internet of Things (IoT), which are currently available for the Mobile Ad-hoc networks (MANETs) and wireless sensor networks (WSNs). There are several issues which are limiting the growth of Internet of Things. These include the reliability, link failures, routing, heterogeneity etc. The MANETs and WSNs routing issues impose almost same requirements for IoT routing mechanism. The recent work of the worldwide researchers is focused on this area. protocols are based on the principles of swarm intelligence. The swarm intelligence is applied to achieve the optimality and the efficiency in solving the complex, multi-hop and dynamic requirements of the wireless networks. The application of the ACO technique tries to provide answers to many routing issues. Using the swarm intelligence and ant colony optimization principles, it has been seen that, the protocols’ efficiency definitely increases and also provides more scope for the development of more robust, reliable and efficient routing protocols for the IoT. As the various standard protocols available for MANETs and WSNs are not reliable enough, the paper finds the need of some efficient routing algorithms for IoT.


2021 ◽  
Vol 11 (03) ◽  
pp. 13-23
Author(s):  
K. Divya ◽  
B. Srinivasan

The Internet of things (IoT) is a heterogeneous network of different types of wireless networks such as wireless sensor networks (WSNs), ZigBee, Wi-Fi, mobile ad hoc networks (MANETs), and RFID. To make IoT a reality for smart environment, more attractive to end users, and economically successful, it must be compatible with WSNs and MANETs. In light of this, the present paper discusses a novel quantitative trust model for an IoT-MANET. The proposed trust model combines both direct and indirect trust opinion in order to calculate the final trust value for a node. Further, a routing protocol has been designed to ensure the secure and reliable end-to-end delivery of packets by only considering trustworthy nodes in the path. Simulation results show that our proposed trust model outperforms similar existing trust models.


The Internet of Things (IoT) is viewed as one of the quickest cum-developing advances giving a deep rooted arrangement towards getting to the moderate and clean vitality around the globe however has dependably requested a cross-layer way to deal with handle the basic prerequisites of each layer actualized in TCP/IP convention suite. The point of this examination paper is to convey a concise audit of vitality productive cross-layer steering conventions for IoT systems. The paper enrolls novel commitments by differed analysts over the world concerning steering conventions proposed. Moreover, the paper likewise displays relative investigation of directing conventions based on specialized details principally concentrating on vitality productivity. It was likewise discovered that a large portion of these conventions did not have the highlights of security and portability since they depended on either Wireless Sensor Networks (WSNs) or Mobile Ad hoc Networks (MANETs).


2011 ◽  
Vol 9 (1) ◽  
pp. 1-15 ◽  
Author(s):  
Erik Nordström ◽  
Per Gunningberg ◽  
Christian Tschudin

Sign in / Sign up

Export Citation Format

Share Document