Skip to main content

Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
Book cover Security and Privacy in Communication Networks (SecureComm 2018)

Abstract

As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Authentication or identity management systems that prevent users from setting up arbitrary numbers of nodes are often missing in MANETs. As a result, attackers are able to introduce nodes with a multitude of identities into the network, thereby controlling a substantial fraction of the system and undermining its functionality and security. Additionally, MANETs are often partitioned and lack Internet access. As a result, implementing conventional measures based on central authorities is difficult. This paper fills the gap by introducing a decentralized blockchain-based identity system called Unchained. Unchained binds identities of nodes to addresses on a blockchain and economically disincentivizes the production of spurious identities by raising the costs of placing large numbers of Sybil identities in a network. Care is taken to ensure that circumventing Unchained results in costs similar or higher than following the protocol. We describe an offline verification scheme, detail the functionalities of the concept, discuss upper- and lower-bounds of security guarantees and evaluate Unchained based on case-studies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mining - Bitcoin Wiki. https://en.bitcoin.it/w/index.php?title=Mining&oldid=64115#Reward. Accessed 11 Dec 2017

  2. Transaction - Bitcoin Wiki. https://en.bitcoin.it/w/index.php?title=Transaction&oldid=63712. Accessed 11 Dec 2017

  3. Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K.: Lightweight sybil attack detection in MANETs. IEEE Syst. J. 7(2), 236–248 (2013)

    Article  Google Scholar 

  4. Bitcoin Project: Bitcoin Developer Guide (2017). https://bitcoin.org/en/developer-guide#proof-of-work. Accessed 18 Dec 2017

  5. Bitcoincharts: Bitcoincharts API, Price data (MtGox, BTC-e, BitStamp, Coinbase). https://api.bitcoincharts.com/v1/csv/. Accessed 29 Nov 2017

  6. Blockchain.info: Bitcoin Blockchain, Difficulty. https://api.blockchain.info/charts/difficulty?format=csv. Accessed 29 Nov 2017

  7. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE Symposium on Security and Privacy, pp. 104–121, May 2015

    Google Scholar 

  8. Bussmann, O.: The future of finance: fintech, tech disruption, and orchestrating innovation. In: Francioni, R., Schwartz, R.A. (eds.) Equity Markets in Transition: The Value Chain, Price Discovery, Regulation, and Beyond, pp. 473–486. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-45848-9_19

    Chapter  Google Scholar 

  9. Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292–2303 (2016)

    Article  Google Scholar 

  10. Dai, P., Mahi, N., Earls, J., Norta, A.: Smart-contract value-transfer protocols on a distributed mobile application platform (2017). https://qtum.org/uploads/files/a2772efe4dc8ed1100319c6480195fb1.pdf. Accessed 22 Nov 2017

  11. Dhamodharan, U.S.R.K., Vayanaperumal, R.: Detecting and preventing sybil attacks in wireless sensor networks using message authentication and passing method. Sci. World J. 2015 (2015)

    Google Scholar 

  12. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24

    Chapter  Google Scholar 

  13. Ethereum Team: Byzantium HF Announcement (2017). https://blog.ethereum.org/2017/10/12/byzantium-hf-announcement/. Accessed 30 Nov 2017

  14. Etherscan: Ethereum Charts and Statistics (2017). https://etherscan.io/charts. Accessed 30 Nov 2017

  15. Horst, H.A., Miller, D.: Digital Anthropology. A&C Black, London (2013)

    Google Scholar 

  16. John, R., Cherian, J.P., Kizhakkethottam, J.J.: A survey of techniques to prevent sybil attacks. In: 2015 International Conference on Soft-Computing and Networks Security (ICSNS), pp. 1–6. IEEE (2015)

    Google Scholar 

  17. Leiding, B., Cap, C.H., Mundt, T., Rashidibajgan, S.: Authcoin: validation and authentication in decentralized networks. In: The 10th Mediterranean Conference on Information Systems - MCIS 2016, Cyprus, CY, September 2016

    Google Scholar 

  18. Leiding, B., Memarmoshrefi, P., Hogrefe, D.: Self-managed and blockchain-based vehicular ad-hoc networks. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, pp. 137–140. ACM (2016)

    Google Scholar 

  19. Macker, J.: Mobile ad-hoc networking (MANET): routing protocol performance issues and evaluation considerations, RFC 2501 (1999)

    Google Scholar 

  20. McCorry, P., Shahandashti, S.F., Clarke, D., Hao, F.: Authenticated key exchange over bitcoin. In: Chen, L., Matsuo, S. (eds.) SSR 2015. LNCS, vol. 9497, pp. 3–20. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-27152-1_1

    Chapter  Google Scholar 

  21. van der Meulen, R.: Gartner says 8.4 billion connected “things” will be in use in 2017, up 31 percent from 2016 (2017). https://www.gartner.com/newsroom/id/3598917. Accessed 01 Nov 2017

  22. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf. Accessed 26 Jan 2017

  23. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268. ACM (2004)

    Google Scholar 

  24. Nguyen, Q.K.: Blockchain - a financial technology for future sustainable development. In: International Conference on Green Technology and Sustainable Development (GTSD), pp. 51–54. IEEE (2016)

    Google Scholar 

  25. Nordrum, A.: Popular internet of things forecast of 50 billion devices by 2020 is outdated (2016). https://spectrum.ieee.org/tech-talk/telecom/internet/popular-internet-of-things-forecast-of-50-billion-devices-by-2020-is-outdated. Accessed 01 Nov 2017

  26. Ouaddah, A., Elkalam, A.A., Ouahman, A.A.: Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In: Rocha, Á., Serrhini, M., Felgueiras, C. (eds.) Europe and MENA Cooperation Advances in Information and Communication Technologies. AISC, vol. 520, pp. 523–533. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-46568-5_53

    Chapter  Google Scholar 

  27. Popov, S.: The Tangle - Version 1.3 (2017). https://iota.org/IOTA_Whitepaper.pdf. Accessed 22 Nov 2017

  28. Raza, N., Aftab, M.U., Akbar, M.Q., Ashraf, O., Irfan, M.: Mobile ad-hoc networks applications and its challenges (2016)

    Article  Google Scholar 

  29. Su, K., Li, J., Fu, H.: Smart city and the applications. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 1028–1031. IEEE (2011)

    Google Scholar 

  30. Tangpong, A., Kesidis, G., Hsu, H.Y., Hurson, A.: Robust sybil detection for MANETs. In: 2009 Proceedings of 18th International Conference on Computer Communications and Networks, ICCCN 2009, pp. 1–6. IEEE (2009)

    Google Scholar 

  31. Todd, P.: BIP 65 - OP\(\_\)CHECKLOCKTIMEVERIFY (2014). https://github.com/bitcoin/bips/blob/6295c1a095a1fa33f38d334227fa4222d8e0a523/bip-0009.mediawiki. Accessed 11 Dec 2017

  32. Wood, G.: Ethereum: a secure decrentralized generalised transaction ledger (2014). http://gavwood.com/paper.pdf. Accessed 22 Nov 2017

  33. Xiao, B., Yu, B., Gao, C.: Detection and localization of sybil nodes in VANETs. In: Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks And Sensor Networks, pp. 1–8. ACM (2006)

    Google Scholar 

  34. Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: SybilLimit: a near-optimal social network defense against sybil attacks. In: 2008 IEEE Symposium on Security and Privacy, SP 2008, pp. 3–17. IEEE (2008)

    Google Scholar 

  35. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. In: ACM SIGCOMM Computer Communication Review, vol. 36, pp. 267–278. ACM (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arne Bochem .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bochem, A., Leiding, B., Hogrefe, D. (2018). Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds) Security and Privacy in Communication Networks. SecureComm 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 254. Springer, Cham. https://doi.org/10.1007/978-3-030-01701-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01701-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01700-2

  • Online ISBN: 978-3-030-01701-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics