Skip to main content
Log in

RETRACTED ARTICLE: SybilWatch: a novel approach to detect Sybil attack in IoT based smart health care

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

This article was retracted on 27 June 2022

This article has been updated

Abstract

Internet of things (IoT) in health care is gaining popularity in the field of research to improve quality in smart health care systems and applications. However, security and privacy of Smart Health (S-Health) data are the challenging issues due to Sybil attacks. Sybil attack is one of the most common attacks where a malicious node uses morphed identities to generate Sybil nodes. Sybil nodes can acquire an authorized node identity and misbehaves by affecting its routing information, incurs interruption on communication line and storage. One of the IoT based smart health methodology is Privacy-Aware Smart Health (PASH), in which policy hiding is used to protect the privacy of users. The major issues in PASH is expensive to implement in S-Health applications, also it does not deal with attribute revocation and node traceability. To addresses these issues, a novel SybilWatch Enhanced Privacy-Aware Smart Health (E-PASH) approach is proposed in this paper. This approach has three major phases such as initialization phase, secure communication and Sybil node detection. A Lightweight Encryption Algorithm (LEA) is used to transmit SHRs (Smart Health Record) in encrypted form using prime order grouping. A novel BlueTits Detection (BTD) algorithm is used in detection phase where cluster head gathers the recent activities of the suspicious user, and based on the gathered parameters (Master key and Last One-Time Authentication), the cluster head declares it as a Sybil node. As soon as Sybil node is detected, revised revocation list is shared with active users. The proposed approach is less expensive compared to the existing approach, it also supports attribute revocation and node traceability which are the major setbacks is PASH. Simulation results and comparison analysis shows that proposed SybilWatch is efficient and cost effective compared to the existing approach, the proposed approach yields high detection rate of 99.7% and also false positive rate is reduced to 1% in the smart health systems, which is better compared to the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

Change history

References

  • Abbas S (2019) An efficient Sybil attack detection for internet of things. Springer International Publishing

  • Aziz A et al (2013) A survey on distributed topology control techniques for extending the lifetime of battery powered wireless sensor networks. IEEE Commun Surveys Tutor 15(1):121–144

    Article  Google Scholar 

  • Baker SB et al (2017) Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5:26521–26544

    Article  Google Scholar 

  • Bouassida MS et al (2009) Sybil nodes detection based on received signal strength variations within VANET. IJ Netw Secur 9:22–33

    Google Scholar 

  • Cui H et al (2016) An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures. In: Proceedings of international conference on provable security (ProvSec’16), pp 19–8

  • Danezis G, Mittal P (2009) SybilInfer: detecting Sybil nodes using social networks. In: Proceedings of the network and distributed system security symposium. San Diego, pp 1–15

  • Demirbas M, Song Y (2006) An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In: Proceedings of international symposium on world of wireless, mobile and multimedia networks, pp 564–570

  • Dua D, Graff C (2019) UCI machine learning repository. University of California, School of Information and Computer Science, Irvine. https://archive.ics.uci.edu/ml

  • Evans D (2011) The internet of things—how the next evolution of the internet is changing everything. White Paper. Cisco Internet Business Solutions Group (IBSG)

  • Feng X et al (2016) A method for defensing against multi-source Sybil attacks in VANET. Springer

  • Ferreira HGC et al (2013) IoT architecture to enable intercommunication through REST API and UPnP using IP, ZigBee and Arduino. In: IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob), pp 53–60. https://doi.org/10.1109/WiMOB.2013.6673340

  • Ferreira HGC, de Sousa Junior RT (2017) Security analysis of a proposed IoT middleware. Springer

  • Foschini L et al (2011) M2M-based metropolitan platform for IMS-enabled road traffic management in IoT. IEEE Commun Mag 49(11):50–57

    Article  Google Scholar 

  • Gai K et al (2018) Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet Things J 4662:1–8

    Google Scholar 

  • Gopikrishnan S, Priakanth P, Awangga RM (2019) HSIR: hybrid architecture for sensor identification and registration for IoT applications. J Supercomput 75(8):5000–5018. https://doi.org/10.1007/s11227-019-02780-2

    Article  Google Scholar 

  • Haifeng Y et al (2006) SybilGuard: defending against Sybil attacks via social networks. ACM

  • He J et al (2014) Time synchronization in WSNs: a maximum-value-based consensus approach. IEEE Trans Autom Control 59(3):660–675

    Article  MathSciNet  Google Scholar 

  • Huang J et al (2014) A novel deployment scheme for green Internet of Things. IEEE Internet Things J 1(2):196–205

    Article  Google Scholar 

  • Jangara A, Priyanka S (2011) Securing LEACH protocol from Sybil attack using jakes channel scheme (JCS). In: Proceedings of international conferences on advances in ICT for emerging regions

  • Jin C et al (2016) Fully secure hidden ciphertext policy attribute-based encryption with short ciphertext size. In: Proceedings of international conference on communication and network security (ICCNS’16), pp 91–98

  • Jin J et al (2014) An information framework of creating a smart city through internet of things. IEEE Internet Things J 1(2):112–121

    Article  Google Scholar 

  • Jing Q et al (2014) Security of the internet of things: perspectives and challenges. Springer, Boston

    Google Scholar 

  • Lai J et al (2011) Fully secure cipher text-policy hiding cp-abe. In: Proceedings of international conference on information security practice and experience (ISPEC’11), pp 24–39

  • Li X et al (2011) Smart community: an internet of things application. IEEE Commun Mag 49(11):68–75

    Article  Google Scholar 

  • Lian Q et al (2007) An empirical study of collusion behavior in the Maze P2P file-sharing system. In: Proc. IEEE int. conf. distrib. comput. syst. (ICDCS), pp 56–66

  • Liu Y, Bild DR et al (2015) MasonTest: a defense against Sybil attacks in wireless networks without trusted authorities. IEEE

  • Lo NW, Tsai HC (2009) A reputation system for traffic safety event on vehicular ad hoc networks. In: EURASIP J Wirel Commun Netw, pp 1–10

  • Mohaisen A, Hollenbeck S (2014) Improving social networkbased sybil defenses by rewiring and augmenting social graphs. In: Information security applications. Springer International Publishing, pp 65–80

  • Paper W (2012) Healthcare data security: part II Embracing change to manage cost and risk. In: CGI, pp 1–3

  • Perera C et al (2014) Context aware computing for the internet of things: a survey. IEEE Commun Surveys Tutor 16(1):414–454

    Article  Google Scholar 

  • Satpathy S, Mohan P, Das S, Debbarma S (2019) A new healthcare diagnosis system using an IoT-based fuzzy classifier with FPGA. J Supercomput. https://doi.org/10.1007/s11227-019-03013-2

    Article  Google Scholar 

  • Seo JH, Cheon JH (2012) Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures, pp 133–150

  • Sssu KF et al (2006) Detecting Sybil attacks in wireless sensor networks using neighboring information. Comput Netw 3:3024–3056

    Google Scholar 

  • Ssu K-F et al (2009) Detecting Sybil attacks in wireless sensor networks using neighbor information. Elsevier

  • Stirbu V (2008) Towards a RESTful plug and play experience in the web of things. In: IEEE international conference on semantic computing, pp 512–517. https://doi.org/10.1109/ICSC.2008.51

  • Sun Y et al (2016) Attacks and counter measures in the internet of vehicles. Springer

  • Tang C et al (2014) Comparative investigation on CSMA/CA-based opportunistic random access for internet of things. IEEE Internet Things J 21(1):33–41

    Google Scholar 

  • Tarouco LMR et al (2012) Internet of things in healthcare: interoperability and security issues. In: IEEE int. conf. commun., pp 6121–6125

  • Understanding Universal Plug and Play. https://www.upnp.org/download/UPNP_understandingUPNP.doc. Accessed 18 Feb 2014

  • Xiao L et al (2009) Channel-based detection of Sybil attacks in wireless networks. IEEE

  • Yang M et al (2005) An empirical study of free riding behavior in the Maze P2P file-sharing system. In: Proc. 4th int. workshop peer-to-peer syst. (IPTPS), pp 182–192

  • Yang Y et al (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4662:1–10

    Google Scholar 

  • Yu H, Kaminsky M, Gibbons PB (2008) SybilGuard: defending against Sybil attacks via social networks. IEEE/ACM Trans Netw 16:576–589

    Article  Google Scholar 

  • Yu B, Xu CZ, Xiao B (2013) Detecting Sybil attacks in VANETs. J Parallel Distrib Comput 73:746–756

    Article  Google Scholar 

  • Zhang K et al (2014) Sybil attacks & their defences in the IoT. IEEE

  • Zhang Y et al (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 3(1):1–15

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Vaishnavi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s12652-022-04241-w"

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vaishnavi, S., Sethukarasi, T. RETRACTED ARTICLE: SybilWatch: a novel approach to detect Sybil attack in IoT based smart health care. J Ambient Intell Human Comput 12, 6199–6213 (2021). https://doi.org/10.1007/s12652-020-02189-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02189-3

Keywords

Navigation