kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Detecting Mobile Crowdsensing Sybil Attackers via Presence Verification
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.ORCID iD: 0000-0003-4761-7676
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS.ORCID iD: 0000-0002-3267-5374
2024 (English)In: CPSIoTSec 2024 - Proceedings of the 6th Workshop on CPS and IoT Security and Privacy, Co-Located with: CCS 2024, Association for Computing Machinery (ACM) , 2024, p. 118-124Conference paper, Published paper (Refereed)
Abstract [en]

Mobile crowdsensing (MCS) relies on smart, portable devices to conveniently collect sensory data from our surroundings. MCS-based apps, e.g., Google Maps, are already well-integrated into our everyday lives. However, Sybil-based attacks, with an attacker creating many fake identities and the illusion of numerous contributors to influence MCS-based functionality, pose a significant threat. MCS systems need security, including mechanisms to vet incoming users and prevent the introduction of Sybil nodes. Intuitively, each incoming contributor can be verified to be an actual device near other devices by other newcomers and contributors already part of the MCS system. We propose a novel cooperative MCS user presence verification protocol based on this idea, also ensuring users are physically present in locations relevant to the MCS tasks. The protocol leverages a commodity component, Bluetooth, with each user broadcasting to prove their presence to users listening and recording Received Signal Strength Indicator (RSSI) values in multiple randomized rounds. The presence verification is done by a simple server tasked with registering users and orchestrating the protocol based on the collected information. The protocol identifies a broadcast signal on behalf of multiple users, indicating a potential Sybil behavior. We conduct extensive simulations to evaluate the performance of the proposed method, demonstrating its ability to find Sybils with high accuracy even when Sybils are nearly the majority in the protocol session.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2024. p. 118-124
Keywords [en]
mobile crowdsensing, presence verification, sybil attacks
National Category
Communication Systems Telecommunications Computer Systems Computer Engineering
Identifiers
URN: urn:nbn:se:kth:diva-359254DOI: 10.1145/3690134.3694826Scopus ID: 2-s2.0-85215532056OAI: oai:DiVA.org:kth-359254DiVA, id: diva2:1932580
Conference
6th Workshop on CPS and IoT Security and Privacy, CPSIoTSec 2024, Salt Lake City, United States of America, October 14-18, 2024
Note

Part of ISBN 9798400712449

QC 20250131

Available from: 2025-01-29 Created: 2025-01-29 Last updated: 2025-01-31Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Eryonucu, CihanPapadimitratos, Panos

Search in DiVA

By author/editor
Eryonucu, CihanPapadimitratos, Panos
By organisation
Software and Computer systems, SCS
Communication SystemsTelecommunicationsComputer SystemsComputer Engineering

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 47 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf