Abstract
Participatory sensing is a revolutionary paradigm in which volunteers collect and share information from their local environment using mobile phones. Nevertheless, one of the most important issues and misgiving about participatory sensing applications is security. Different from other participatory sensing application challenges who consider user privacy and data trustworthiness, we consider network trustworthiness problem namely Sybil attacks in participatory sensing. Sybil attacks is a particularly harmful attack against participatory sensing application, where Sybil attacks focus on creating multiple online user identities called Sybil identities and try to achieve malicious results through these identities. In this paper, we proposed a Hybrid Trust Management (HTM) framework for detecting and analyze Sybil attacks in participatory sensing network. Our HTM was proposed for performing Sybil attack characteristic check and trustworthiness management system to verify coverage nodes in the participatory sensing. To verify the proposed framework, we are currently developing the proposed scheme on OMNeT++ network simulator in multiple scenarios to achieve Sybil identities detection in our simulation environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., Srivastava, M.B.: Participatory sensing. In: Proc. ACM WSW (October 2006)
Denning, T., Andrew, A., Chaudhri, R., Hartung, C., Lester, J., Borriello, G., Duncan, G.: BALANCE: Towards a usable pervasive wellness application with accurate activity inference. In: Proc. ACM HotMobile 2009 (February 2009)
Stuntebeck, E.P., Davis II, J.S., Abowd, G.D., Blount, M.: HealthSense: Classification of health-related sensor data through user-assisted machine learning. In: Proc. ACM HotMobile 2008 (February 2008)
Deng, L., Cox, L.P.: LiveCompare: grocery bargain hunting through participatory sensing. In: Proc. ACM HotMobile 2009 (February 2009)
Mendez, D., Labrador, M.A.: On sensor data verification for participatory sensing systems. Journal of Networks 8(3), 576–587 (2013)
Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Grover, J., Gaur, M.S., Laxmi, V.: A Sybil attack detection approach using neighboring vehicles in VANET. In: Proc. SIN 2011, pp. 151–158 (November 2011)
Josang, A., Ismail, R.: The Beta reputation system. In: Proc. 15th Bled Electron. Commerce Conf. (June 2002)
Ries, S.: Extending Bayesian trust models regarding context-dependence and user friendly representation. In: Proc. ACM SAC 2009, pp. 213–237 (March 2009)
Brandic, I., Dustdar, S., Anstett, T., Schumm, D., Leymann, F., Konrad, R.: Compliant Cloud Computing (C3): Architecture and language support for user-driven compliance management in clouds. In: Proc. IEEE CLOUD 2010 (July 2010)
Hwang, K., Li, D.: Trusted cloud computing with secure resources and data coloring. IEEE Internet Computing 14(5), 14–22 (2010)
Piro, C., Shields, C., Levine, B.N.: Detecting the Sybil attack in ad hoc networks. In: SecureComm 2006 (August 2006)
Chang, S.-H., Huang, T.-S.: A fuzzy knowledge based fault tolerance algorithm in wireless sensor networks. In: Proc. IEEE AINA 2012, pp. 891–896 (March 2012)
Hornig, R., Varga, A.: An overview of the OMNeT++ simulation environment. In: Proc. SIMUTools 2008 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Chang, SH., Tseng, KK., Cheng, SM. (2014). The Sybil Attack in Participatory Sensing: Detection and Analysis. In: Pan, JS., Snasel, V., Corchado, E., Abraham, A., Wang, SL. (eds) Intelligent Data analysis and its Applications, Volume I. Advances in Intelligent Systems and Computing, vol 297. Springer, Cham. https://doi.org/10.1007/978-3-319-07776-5_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-07776-5_30
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07775-8
Online ISBN: 978-3-319-07776-5
eBook Packages: EngineeringEngineering (R0)