Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Study of the Navigation Method for a Snake Robot Based on the Kinematics Model with MEMS IMU
Next Article in Special Issue
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors
Previous Article in Journal
Validation of the VitaBit Sit–Stand Tracker: Detecting Sitting, Standing, and Activity Patterns
Previous Article in Special Issue
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information

1
Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China
2
Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Ministry of Education, Tianjin University of Technology, Tianjin 300384, China
3
College of Computer and Control Engineering, Nankai University, Tianjin 300350, China
4
Department of Computer Science, Middlesex University, London NW4 4BT, UK
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(3), 878; https://doi.org/10.3390/s18030878
Submission received: 31 January 2018 / Revised: 4 March 2018 / Accepted: 13 March 2018 / Published: 15 March 2018
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)
Figure 1
<p>Sybil attack models. (<b>a</b>) Attack for different angles; (<b>b</b>) attack for the same angles; (<b>c</b>) a large number of Sybil nodes.</p> ">
Figure 2
<p>Different methods of measuring the angle of arrival. (<b>a</b>) Traditional MUSIC Algorithm; (<b>b</b>) self-Adaptive MUSIC Algorithm.</p> ">
Figure 3
<p>Overview of the Sybil attack detection system. CSI, Channel State Information.</p> ">
Figure 4
<p>Sybil attack detection system of multiple detection APs.</p> ">
Figure 5
<p>Different data processing methods. (<b>a</b>) Low pass filter; (<b>b</b>) PCA; (<b>c</b>) Savitzky–Golay (SG) filter.</p> ">
Figure 6
<p>Motion detection of different packets. (<b>a</b>) Client from static to moving; (<b>b</b>) variance; (<b>c</b>) variance rate of changes.</p> ">
Figure 7
<p>Amplitude and RSSI of different distances. (<b>a</b>) RSSI of different distances; (<b>b</b>) amplitude of different distances.</p> ">
Figure 8
<p>Different activities in the environment.</p> ">
Figure 9
<p>AoA Error bar of different clients. (<b>a</b>) Error bar of access points; (<b>b</b>) error bar of mobile devices.</p> ">
Figure 10
<p>AoA Estimation error. (<b>a</b>) CDF of access points; (<b>b</b>) CDF of access points of different packets.</p> ">
Figure 11
<p>Different attacks’ Sybil node detection rate. (<b>a</b>) Sybil attacks’ Sybil node detection rate; (<b>b</b>) spoofing attacks’ Sybil node detection rate.</p> ">
Figure 12
<p>Different mobile clients in the environment.</p> ">
Figure 13
<p>Dynamic Sybil attack detection rates for different mobile clients.</p> ">
Versions Notes

Abstract

:
With the development of the Internet-of-Things (IoT), wireless network security has more and more attention paid to it. The Sybil attack is one of the famous wireless attacks that can forge wireless devices to steal information from clients. These forged devices may constantly attack target access points to crush the wireless network. In this paper, we propose a novel Sybil attack detection based on Channel State Information (CSI). This detection algorithm can tell whether the static devices are Sybil attackers by combining a self-adaptive multiple signal classification algorithm with the Received Signal Strength Indicator (RSSI). Moreover, we develop a novel tracing scheme to cluster the channel characteristics of mobile devices and detect dynamic attackers that change their channel characteristics in an error area. Finally, we experiment on mobile and commercial WiFi devices. Our algorithm can effectively distinguish the Sybil devices. The experimental results show that our Sybil attack detection system achieves high accuracy for both static and dynamic scenarios. Therefore, combining the phase and similarity of channel features, the multi-dimensional analysis of CSI can effectively detect Sybil nodes and improve the security of wireless networks.

1. Introduction

With the widespread deployment of the Internet-of-Things (IoT), its security issues have become increasingly prominent. Due to the broadcast nature of the IoT network, the privacy and security of clients will be severely threatened. Although the WLAN network is equipped with the 802.11i security protocol [1], there are still vulnerabilities in the agreement. Specifically, the Sybil attack is discussed in peer-to-peer systems by J.R.Douceur [2], which means that a client forges multiple wireless devices. The forged devices may be an existing device in the WLAN network or a virtual attack device. Each fake device can be used as a middleman to steal real clients’ private information, and when a large number of forged devices access the networks and send large amounts of data, this will block the communication of other devices in the wireless networks, which is also a kind of association flood Denial of Service (DoS) attack [3].
The previous Sybil attack detection algorithms are almost all based on the Received Signal Strength Indicator (RSSI) [4,5,6,7]. However, if there is no accurate location model, those algorithms only detect the attack by collecting fingerprints, and their detection range and robustness have great limitations. Meanwhile, traditional RSSI values will not be stable in a complex indoor environment when a filtering strategy technology is not applied [8]. Because of the complexity of the indoor wireless environment, the difficulty of Sybil attack detection is more serious. Fortunately, Channel State Information (CSI)-based indoor location technology has become more mature in recent years, and this technology can provide more accurate location results. At the same time, it achieves the passive physical layer positioning method without additional positioning equipment. Chronos [9] first achieved decimetre-level positioning in a single commercial WiFi device. Now, SpotFi [10] can achieve a median accuracy of 40 cm by estimating the Time of Flight (ToF) and Angle of Arrival (AoA) for WiFi devices.
As a result, we propose a novel Sybil attack detection algorithm based on CSI. The algorithm can detect attackers separately from both static and dynamic aspects. It is different from our previous attack detection method [11]. The biggest difference between the two papers lies in the wider application scenarios and the improved Sybil attack detection system. Although our previous paper can detect some static Sybil nodes in the environment by combining AoA and RSSI, they can only be applied to situations where there is no movement in the WLAN environment, that is the attack nodes will not be detected during the moment of their movements. Based on this, this paper put forward a complete Sybil attack detection system and dynamic attack detection algorithm, which can not only be applied to static attacks, but also to dynamic attacks. At the same time, the problem of RSSI instability in our previous paper is also solved by combining the amplitude in this paper, which makes the detection results more stable and can be more generally applicable to complex WLAN environments.
First of all, in this paper, we combine the CSI and RSSI values to remove the DC noise in the static channel state. By eliminating the sampling frequency deviation and sampling time deviation [12], we propose a self-adaptive Multiple Signal Classification (MUSIC) algorithm detection scheme for passive detection. The algorithm can effectively determine the angle of the user in the WLAN environment, and the implementation of the algorithm only needs to be detected by one AP. We distinguish between APs in different locations according to the difference of RSSIs and amplitudes in different locations and AoA technology [13,14]. This way, we can accurately distinguish between users and attackers in different locations. Secondly, on the dynamic side, it is well known that an attack may move its position within a detection threshold to avoid static detection. Therefore, we use the Density-Based Spatial Clustering of Applications with Noise (DBSCAN) clustering method [15] for all attack nodes constructed by Sybil clients that fall within the detection threshold and within the RSSI threshold. The clustering method distinguishes the attacking nodes from the normal nodes simultaneously. The algorithm enhances the overall detection accuracy.
At the same time, we propose a Sybil attack detection system. The system was able to passively detect WiFi attacks on users or AP, both static and dynamic, in real time. Finally, we experimentally test Sybil attacks at different positions and angles of the algorithm. Experiments show that physical layer-based detection can ignore any attacks on the protocol layer and the MAC layer. It can accurately detect dynamic and static attacks.
Our main contributions are summarized as follows.
  • We propose a novel Sybil attack detection based on WLAN physical layer information. It can detect the static and dynamic attackers without any dedicated infrastructure.
  • We develop a novel self-adaptive MUSIC algorithm to calculate the phase offset between the antennas. It can estimate the angle of wireless devices more accurately than traditional MUSIC algorithms.
  • We realize a Sybil attack detection system on a common commercial platform. Extensive experiments prove that the performance of the Sybil detection is good.
The rest of paper will be carried out in the following sections: Related work is discussed in Section 2. Preliminary channel state information and Sybil attack models are given in Section 3. Section 4 is the Sybil attack detection system. Based on this, we propose a static attack detection algorithm in Section 5 and a dynamic attack detection algorithm in Section 6. Section 7 contains the experiment simulation. We will summarize in Section 8.

2. Related Work

As mentioned in the previous section, Sybil attacks [2] are first proposed on a distributed P2P system. It verifies that the Sybil attack occurs in the distributed storage algorithms without authentication, which can easily destroy the distributed key hash table of the system. Then, Karlof and Wagner [16] proved that distributed routing and geographic routing protocols can also be easily attacked by Sybil attacks in WSN. Newsome [17] contrasts multiple intermediate defence mechanisms such as radio resource testing and random key pre-distribution. Random key pre-distribution, which is authenticated by each node ID, has obtained relatively good results. However, each node needs to store and generate a large number of keys, which severely consumes the resources of the system. Meanwhile, the algorithm cannot resist the replay attack. Other algorithms based on authentication mechanisms [18,19] also have a similar defect as long as this is a reinforcement for the protocol layer. Pecori R. [20] proposes new methods of key agreement protocol, which can effectively resist Sybil attacks for P2P VoIP application from the transport layer. At the same time, another of his methods [21] makes the routing and the storage and retrieval of resources in a Kademlia network more secure through exploiting reputation techniques for the Sybil attack in the network layer. With the development of public cloud storage [22] and new schemes for outsourced databases recently, the new encryption methods [23,24,25] and a practical oblivious RAM with a variable block size [26] may solve the privacy and security problems caused by the Sybil attack. This paper mainly discusses the attack detection of the physical layer in the WLAN [27], so the application of these algorithms will not be done.
In recent years, Sybil attacks have been extensively studied in Wireless Sensor Networks (WSN), ad hoc networks, Vehicular Ad Hoc Networks(VANETs) [28] and Wireless Body Area Networks (WBANs) [29]. Most of the detection schemes are active and static in collecting user information, which may be data packets or RSSI values. RSSI has the advantages of lightweight and accurate detection when applied to attack detection. Consequently, in WSN, Demirbas et al. [4] firstly judged Sybil nodes by comparing the RSSI ratio differences between the neighbours’ nodes in the past. This method requires at least four detection nodes to achieve higher detection accuracy, and the wireless network environment must be arranged in advance. Furthermore, Shi [30] was able to detect attacks in the initialization phase when combining the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol features with RSSI-ID tables. Still in WSN, Gu [31,32] used the K-nest and SVM algorithm in RSSI to achieve high detection efficiency and low error detection rate. However, the algorithm consumes too much detection time. In other methods, the ToA or TDoA detection algorithm [33,34] did not collect RSSI and used special positioning devices to collect every node’s angle information, including Sybil nodes. Obviously, the attacker will deliberately avoid being collected. In ad hoc networks, Mevlut [7] proposed an system INTERLOC for automatic adjustment of the positioning precision according to the level of environmental interference, which can effectively improve the detection precision of Sybil nodes. In VANET, RSSI-based detection methods are also widely used. Combining the statistical method with the RANSAC algorithm for RSSI, Yu, B. et al. [35] can distinguish the image of traffic congestion caused by attack detection. However, this method does not detect when the attack node is close to the physical vehicle. The work in [36] adds multiple detection nodes to collect the RSSI of the vehicle to determine whether it is consistent with the beacon node. Feng, X. et al. [37] used an event-based reputation system to defend against Sybil attacks. They can keep the vehicle’s identity private. However, these methods always need to rely on certain trust relationships, and the amount of information stored by each node is too large. Furthermore, by combining the RSSI of different transmit powers, Liu, R. et al. [38] combated Sybil attacks against stealing user privacy and health data in WBAN. Xiao, L. et al. [39] proposed a channel-based authentication technology to detect Sybil attacks in wireless networks, using the uniqueness of channel response in WLAN. Although a single identity node can only correspond to one location and the RSSI is proportional to the distance, the RSSI is not stable in the time domain and may differ at different times.
Meanwhile, there are many mobile elements [40,41] in most wireless networks. Once node movement exists in the environment, the traditional static algorithms of RSSI and other information will be invalid. Jamshidi, M. [42] introduced the mobile watch node into the WSN, which realizes a true negative detection rate of 94% and a false detection of zero for the movement of Sybil nodes.

3. Preliminaries

3.1. Channel State Information

RSSI belongs to the MAC layer information, which is easy to obtain, but the stability is low. When the environment becomes complex, it will be subject to the influence of multipath effects in the environment, and RSSI will be the superposition value of multipath signals. However, CSI is the application of physical layer OFDM with a finer granularity of 30 subcarriers. It can distinguish signals from multiple different paths. Specifically, CSI can be described as:
Y ( f κ ) = H ( f κ ) X ( f κ ) + N
X ( f κ ) is used as the input signal; Y ( f κ ) is the accepted signal; H ( f κ ) is the channel state information matrix on each subcarrier; N is the environmental noise. Therefore, the CSI of each subcarrier can be approximated as:
H ( f κ ) Y ( f κ ) X ( f κ )
According to the 802.11n physical layer protocol, the CSI will be divided into 56 subcarriers in the 20-MHz band mode. Each carrier frequency is f k = f c e n t r e + 0.3125 k , where k corresponds to the carrier index from −28–1, 1–28. Each carrier interval is 0.3125 MHz. f c e n t r e is the centre of the carrier frequency.
Intel 5300 NIC output is the CSI of 30 subcarriers because the CSI value is one output for each of the two adjacent carriers. That is, the received CSI is H = [ H ( f 1 ) H ( f k ) ] . Similarly, if the frequency band of 40 MHz is used, according to the protocol, the number of subcarriers will be 114, and the carrier interval remains unchanged. By using MIMO technology, we assume that the number of transmitting antennas and receiving antennas is N t x and N r x , then the CSI dimension of the multi-antenna is N t x × N r x × 30 . H k = H k e j sin ( H k ) , sin ( H k ) and H k are the phase and amplitude of the K subcarrier respectively.
The phase will be what we are going to use in the MUSIC algorithm. The Channel Impulse Response (CIR) is obtained by inverse Fourier transform of the Channel Frequency Response (CFR). Then, the multipath channel in the time domain can be expressed as h ( τ ) = i = 1 N a i e j θ i ( τ τ i ) , and the multipath function CIR reflects the multipath channel condition at the receiver. a i , θ , τ i are expressed as the amplitude, phase offset and transmission delay of the i-th path. N is the total number of transmission paths.
Recently, Halperin obtained the Channel State Information (CSI) by modifying the Intel 5300 network card driver from the ordinary WiFi device. In 802.11a/g/n, the CSI is the sampled version of CFR. Meanwhile, the Atheros CSI tool proposed by Yaxiong is supposed for all types of Atheros 802.11n WiFi chipsets now. Since the subcarriers of different frequencies are not exactly the same in space, it is possible to better characterize the space by CSI and improve the accuracy of WiFi localization.

3.2. Sybil Attack Models

In the wireless network, most clients have a fixed position. The Sybil attacker may forge the identity of normal clients, such as IP addresses, MAC addresses or public keys. We present generalized Sybil attack models in Figure 1. We assume that there are four clients A , B , C , D in the indoor wireless network, which are located at 30 , 150 , 60 , 120 of the witnessing AP 1. Client A and client B are located in a 3-m radius of the circle. Similarly, client C and client D are located in a 2-m radius of the circle. AP 1 is the centre of these circles. It receives service requests from those clients in a period of time.
In Figure 1a, we assume Client A is a Sybil client, which is located 30 of AP 1 and steals the identity of Client B. When Client A forged Client B’s ID as node B , Client A sent massive data to AP 1. AP 1 thinks the data are from Client B and exchanges massages with it. This is a spoofing attack, and node B is the Sybil node. Spoofing attacks may also occur at different radians of the same angle above the radius. Unlike Figure 1a, Client A, Client D is located in the same degree 30 . Figure 1b shows that Client A forges the identity information of Client D and appears as node D’. Therefore, the information exchanged between Client D and AP 1 can be tapped by node D’.
As shown in Figure 1c, it is also assumed that Client A is a Sybil client. Client A claims that it has multiple identities such as node A , node A , node A , and so on, which can consume the resources of witnessing AP 1 by sending massive high-rate service requests. Clients B, C, D will fail to access the network especially when the number of Sybil nodes is large enough. This is the typical generalized Sybil attack. Simultaneously, those nodes forged by Client A are Sybil nodes.
The attack’s Sybil nodes and part of normal clients may distribute in a small range. If Sybil nodes A , A , A forged by Client A gather together in Figure 1c, they are distributed in a tiny space around Client C, so we need to detect attackers from a dynamic perspective. In general, this situation happens rarely. However, when the attacker tries to move its position to change the character of the channel, the above situation still cannot be captured.
Therefore, according to the core principle of attack, the Sybil nodes forged by the attacker come from the same physical device, and they must appear or disappear simultaneously. Attack clients have the same physical layer characteristics, such as the same angle and the same distance from the AP. Therefore, whether we can accurately detect a client’s AoA will be the key to identifying Sybil attacks. As we know, in the radar system, the MUSIC algorithm [43] can detect the AoA by using the phase difference between the antennas. Therefore, the receiver uses three antennas. At the same time, we combine the MUSIC algorithm with MIMO technology to detect each user’s AoA.

3.3. Angle of Arrival Measurement

The main idea of the MUSIC algorithm is to calculate the covariance matrix of the received signal to separate the signal subspace and the noise subspace. Then, the orthogonality of the two subspaces is used to search for the largest orthogonal spectrum to detect the true signal angle. However, there are multiple propagation paths in the indoor WLAN environment. Because the small obstacles in space will cause the signal reflection multipath effect, the path with the shortest propagation path is considered as the Line-of-Sight (LoS) path, and the other is the Non-Line-of-Sight (NLoS) path.
In a certain distance, we think the signal arrives at the receiving end with parallel waves. Therefore, the same signal will have the same phase offset Δ ϕ between adjacent antennas, Δ ϕ = 2 π d c o s θ λ ; where θ is the true angle of each path, and d is the distance between two antennas. Through the signal frequency f, we can get the signal wavelength λ , so the wave angle θ can be easily calculated as θ = arccos Δ ϕ · λ 2 π d . Assuming that the antenna array is M and the number of signals is D, the received signal X can be expressed as X = A · S + N , where A is the steering vector and S is the signal vector. This represents the perspective of different propagation paths of the environment. Specifically:
A = [ a θ 1 ; a θ 2 ; ; a θ D ] , a θ i = [ 1 , e j Δ φ i , , e j M 1 Δ φ i ]
a θ i is a column vector, and N is an additive Gaussian white noise with a mean of zero; the variance of σ 2 . Therefore, the autocorrelation function of the received signal can be expressed as R X = E x x H = A R s s A H + σ 2 I ; where R s s corresponds to our signal subspace and σ 2 I corresponds to the noise subspace. We know that the eigenvectors corresponding to the noise eigenvalues are orthogonal to the column vectors of matrix A. The columns of A correspond to the direction of the signal. Therefore, the noise feature vector E = v D + 1 , v D + 2 , , v M . Define the spatial spectral function:
P M U θ = 1 a H θ E E H a θ
In Equation (4), the denominator is the inner product of the signal vector and the noise matrix. When the a θ is orthogonal to the E columns, the denominator is zero, and the minimum value is actually taken due to the presence of noise. P M U θ has a spike. By traversing different angles θ , we perform the spectral search, and we can find the AoA. Three antennas can detect the angle of two propagation paths. We only need to detect the LoS path, so the receiver uses three antennas, that is M = 3 . Since the CSI contains 30 subcarriers, we use the covariance mean R x x of 30 to make it accurate.
If the received signal has a component of the LoS path, the LoS path has the strongest signal strength value, then the peak of the signal’s pseudo-spectrum is the AoA of the signal on the LoS path. However, we find that the traditional MUSIC algorithm may have a big error. As we can see in Figure 2a, we test on a client that is located in 90 by the traditional MUSIC algorithm. The result is an LoS angle of 69 , while there is an NLoS angle of 129 . Obviously, this is different from the 90 of the tested LoS path. The reason may be that the radio frequency link connects to the RF oscillator, which will bring phase offset in CSI. However, we found that our self-adaptive MUSIC algorithm in Section 5 can accurately detect the client’s AoA when we eliminate the phase offset and eliminate the NLoS path, which is shown in Figure 2b. At this point, AoA can be accurately measured, and it can solve most, but not all of the issues in the attack model. Based on this, we propose a Sybil attack detection system.

4. Sybil Attack Detection System

Before the system was proposed, we found that the AoA of each client can be accurately detected when it is stationary in the experiment. However, AoA cannot be effectively measured because of multipath interference when attackers or others move in the indoor WLAN environment. Therefore, we also need to design a motion detector to resolve client motion. The amplitude information in the CSI stream is selected from the detector because it is sensitive to the motion in the environment, whereas the original CSI amplitude data are affected by noise, so it should be de-noised. As a result, we design de-noising and motion detection modules for the system.

4.1. Overview of the System

At this point, we can propose a complete Sybil attack detection system. Figure 3 shows an overview of the Sybil attack detection system. According to the state of the Sybil attackers in the environment, the system can detect attacks both statically and dynamically. The system is divided into four modules:
(1)
Denoising: The denoising module eliminates the noise in the CSI stream.
(2)
Motion detection: The motion detection module detects the presence or absence of motion.
(3)
Static detection: If all the nodes remain still, the AoA measurement is performed by the self-adaptive MUSIC algorithm. The static detection algorithm, combined with AoA, RSSI and CSI amplitude, determines whether an attack exists; because CSI amplitude and RSSI are positively related to distance.
(4)
Dynamic detection: However, what if there is movement in the environment? We found that different motions correspond to different amplitude characteristics. Therefore, once there is a client movement in the environment, the dynamic detection algorithm uses the DBSCAN clustering algorithm to determine the attack after feature extraction. Only one central AP is needed to detect attack nodes by the phase and amplitude features.
When multiple APs receive CSI at the same time, they can improve the accuracy of wireless network Sybil attack detection by applying the self-adopted MUSIC algorithm and DBSCAN algorithm. As shown in Figure 4, when all the clients access the network, the central detection AP is responsible for collecting all the client data and sending the data to the server. Multiple APs can also detect if one of the centre APs is attacked by a Sybil node. Furthermore, all the attacks that we present are from indoors. If the attacker is outdoors, both the RSSI and the amplitude decrease sharply and can be easily detected. In general, experiments show that our detection system can respond to a variety of environments and achieve higher detection rates. Next, we will elaborate on each part in detail. First, the de-noising module and the motion recognition module will be explained.

4.2. Denoising

The raw CSI data are subject to noise interference due to state transitions inside Tx and Rx, such as transmission power changes, transmission rate adaptation and additive DC noise of the device. These internal state transitions introduce high-amplitude pulses and burst noise in the CSI. Figure 5a shows the original CSI amplitude when the environment changes. It can be seen that the amplitude is extremely noisy. Accordingly, we should eliminate the interference noise before applying the dynamic detection algorithm.
CSI amplitude values of 30 subcarriers have different sensitivities to changes in the WLAN environment. The traditional noise elimination method uses a low pass filter, which cannot eliminate the impact of burst pulse signals in the environment. What is more, the passband of a conventional low pass filter, such as a Butterworth filter, typically requires less than 1/20 of the sampling rate to suppress the residual energy of the noise. If the cut-off frequency of the low pass filter is too high, the residual noise may distort the flow. Besides, some vibrations may contain not only low frequencies, but also high frequencies. Figure 5a shows the subcarrier signal after the low pass filter with a cut-off frequency of 80 Hz. It eliminates part of the high frequency noise, but has different effects on different carriers, leading to waveform delay. The method of Principal Component Analysis (PCA) is often used in the literature in these cases. PCA can automatically mine the correlation between CSI streams and reorganize the CSI stream to extract the change components caused by human activities. PCA can only show volatility without numerical features. Still, this method also amplifies the effects of changes in the environment. When the environment is still, its PCA value will still have much volatility as shown in Figure 5b. We use the Savitzky–Golay filter to de-noise the received data.
The Savitzky–Golay filter is a filtering method based on local polynomial least squares fitting in the time domain. The biggest feature of this filter lies in the fact that the noise can be filtered at the same time to ensure the shape of the signal and the same width. In attack detection, the waveform needs to be able to fully reflect the fluctuations of the line of sight. Therefore, we can apply the SG filter algorithm to 30 subcarriers at the same time. As shown in Figure 5c, we can see that the CSI amplitude waveform has good volatility and is smoother than the low pass filter when the SG filter is applied.

4.3. Motion Detection

Since the stationary node amplitude characteristics are the same, we only need to detect the time interval of the node movement. It is a challenge to determine the beginning and end of the movement. Figure 6a shows the 4000 packet amplitude data at the transmitter from standstill to walking straight with a speed of 1 m/s. The distance between transmitter and AP with Intel 5300 NIC is 4 m. Because the distance between the peaks is usually higher than 200 when there are movements, we set window size w s = 200 , in order to reduce the computation time and to get accurate resolution of movement. The input data can be expressed as V. When the data are less than w s , they are unavailable data.
V = V 1 , V 2 , , V i , V i = a i , a i + 1 , a i + w s 1   , i w s , a i R
a i is the amplitude of CSI. R is the sequence of the entire amplitude. We calculate the variance x for each V i of the collected data. As shown in Figure 6b, it can be seen that the variance increases obviously with the fluctuation in the window. Small differences in the amplitude of the device at rest can still cause the variance to fluctuate. Therefore, we use the variance rate of variability to identify motions.
k ( i ) = Δ σ i Δ i = σ i σ i 1 i ( i 1 ) = σ i σ i 1
As shown in Figure 6c, when the environment is stationary, the variance increment is almost zero, and when the node moves, the variance changes drastically. Therefore, set the threshold for K; when greater than K, then it is the beginning of the movement. The start and end points can be determined as follows:
S t a r t p o i n t : k ( i ) > K + w s / 2 E n d p o i n t : k ( i ) K + w s ( 1 )
According to the attack detector, we can accurately detect whether the node is moving, so we can use the static detection algorithm to calculate the AoA by the phase feature or detect the attacks with the special amplitude feature by the dynamic detection algorithm.

5. Static Detection Algorithm

5.1. Self-Adaptive MUSIC Algorithm

In a standard WiFi network, the transmitter and receiver are not time-synchronized, so they are not synchronized to the sampling clock at the DAC and ADC. The Sampling Time Offset (STO) [12] will deviate from the arrival time and phase of the LoS path and NLoS path, which possibly cause the direct path of AoA not to be the real wave of the angle. The NLoS path may be determined as the line of sight and produces an offset. Meanwhile, when transmitting the device RF link connection to the RF oscillator, it will generate Sampling Frequency Offset (SFO). The SFO changes the sampling time offset of the same packet, which in turn leads to another additional time offset of the ToF estimate across the packet and unknown phase β .
The total time delays Δ t caused by STO and SFO are very different across two packets’ transmissions between a pair of transmitter and receiver. Hence, the phase of the i-th subcarrier can be expressed as ϕ i ^ = ϕ i + 2 π f i Δ t + β + N i . ϕ i is the genuine CSI phase we are searching for, and N i is measurement noise. We use the classification algorithm to calculate ϕ i , and the values of Δ t and β are always the same. Suppose ϕ i ( m , k ) is the unwarped phase of the CSI at the k-th subcarrier of the i-th packet received at m-th antenna; we can obtain the optimal linear fit of the phase for the i-th packet as:
τ i ^ = arg min Δ t m , k = 1 M , K ( ϕ i ( m , k ) + 2 π f i ( k 1 ) Δ t + β )
The τ i ^ is the time delay of the i-th packet, and we can get modified CSI phase ϕ i ( m , k ) = ϕ i ^ ( m , k ) 2 π f i ( k 1 ) τ i ^ . Our method is similar to sanitizing ToF estimates in SpotFi, and this method eliminates the residual synchronization error in the CSI phase. However, this method destroys the independence of the subcarrier CSI phases so that the processed result can only be used for the digital signature, and the phase deviation of the SFO is not effectively eliminated. In order to eliminate the phase offset of the SFO and obtain a more accurate angle value, we apply the self-adaptive MUSIC algorithm to calculate the phase offset between the antennas.
We assume that the phase deviation between the antennas is δ 0 , δ 1 . Because δ 0 , δ 1 is a hidden random variable, we cannot directly get the size of these two variables, so this algorithm uses the search method. It selects all combinations of δ 0 , δ 1 that can be used to achieve the best combination of the reception effect as our estimated antenna deviation. We verify that we estimate the estimated antenna deviation by a number of experiments.
Because we selected better calibration results from a combination of δ 0 , δ 1 , the true value of the angle is not exactly equal to the value we measured. In addition, it is possible that not all combinations allow the peak of the pseudo spectrum to be exactly equal to the measured value. To improve the stability of the evaluation system, we need to choose a robust evaluation function to evaluate the pseudo spectrum of each combination.
  • When the peak of the dummy spectrum is equal to the measured AoA value, the combination has the greatest probability of being the best calibration.
  • When the peak of the dummy spectrum is close to the measured AoA value, the combination also has a larger probability of becoming the best calibration combination.
Consider the above two points; we designed our evaluation function η ( ρ ) , where ρ is the pseudo spectrum, as follows:
  • Find a normalizing constant k such that ρ = k ρ is one, and set k ρ θ d θ = 1 .
  • Construct a Gaussian mask g α θ with an expected value α and a variance according to the desired level of error tolerance. Set g ¯ α θ = 1 g α θ .
  • Calculate μ ρ = g α θ ρ θ d θ g ¯ α θ ρ θ d θ .
Our algorithm estimates the best deviation for each packet and then calculates the offset of all packets. We will generate two phase deviation values δ 0 , δ 1 in the multiple clustering algorithm and select the most frequent phase deviation combination as our final estimate. Calibrate Antenna 2 and Antenna 3 while applying the calibrated CFR to the traditional MUSIC algorithm. This inherent deviation occurs when the device is started and does not change when the device is running, but the phase deviation is reset when the device is restarted. We apply this algorithm to the spatial smoothing MUSIC algorithm to automatically correct each phase offset at the start of the device.
At this point, we eliminate the time offset in the different CSI packets generated by the STO, make the direct path more accurate and evaluate the optimal phase offset by the self-calibration method, which is generated by the SFO. In the fourth quarter, a large number of experiments shows that for different angles of the AP, the self-calibration algorithm can effectively detect its position.
What we want is only the direct path. Therefore, we adopt spatial smoothing to get the direct path accurately. Though our witnessing AP only has a three-antenna array, it can detect two AoA in the indoor environment. Therefore, we group our antennas into two groups { antenna 1 , 2 ; antenna 2 , 3 } as the input signal to detect the direct path. In detail, spatial smoothing generating signals x 1 , x 2 , x 3 would output two signals x ˙ 1 , x ˙ 2 where x ˙ i = 1 2 ( x ˙ 1 + x ˙ 2 ) , i = 1 , 2 . At last, we implemented two algorithms using only a three-antenna service AP. Testing the same situation as the traditional algorithm, that is the 90 AP on the LoS, our self-adaptive algorithm can accurately detect the LoS, and the detection error is 1 , which shown in Figure 2b. At the same time, the impact of NLoS is eliminated. Compared to Phaser [14] and ArrayTrack [44], we use fewer antenna arrays and achieve the total average error of 6.3 ; accurately enhancing 5.6 compared to traditional algorithms. Similarly, compared with the SpotFi [10] with a certain complexity, we do not need the clustering algorithm to calculate the AP position and ToF estimation.

5.2. Static Sybil Attack Detection

The self-adaptive MUSIC algorithm can accurately calculate the AoA of each client when they are in a static state. However, different clients cannot be distinguished only by their AoAs if they are in the same angle, but not in the same position. Fortunately, CSI packets contain not only distance-related RSSI of different channels, but also stable amplitude information at the physical layer. Suppose node i receives a radio signal from Node 0, then the RSSI is R i = P 0 K α · d i where P 0 represents transmitter power, R i is RSSI and K is the constant of the impulse response of the Rayleigh channel model. d i is the Euclidean distance, and α is the distance-power gradient. Hence, at the same transmit power, the RSSI is inversely proportional to the distance d. As we can prove in Figure 7a, we compare different angles’ total RSSI of the 30 subcarriers in the same radius of 2 m with that in radius of 3 m. We can see clearly the gap between the RSSI of different degrees. The average difference is 1.33 dB. In addition to the 15 gap being relatively small, the other degrees of RSSI differences are more than 2.6 dB. Therefore, we can distinguish between nodes in different angles at different locations effectively.
Some unstable RSSIs may result in completely different values for different time periods. However, on the other hand, CSI energy does not change with time; the CSI energy decreases with the increase of distance, that is the amplitude of the client decays with distance. Figure 7b shows the average amplitude of Subcarrier 1 with a time window of 0.2 s. It can be seen that the magnitude of CSI is approximately inversely proportional to the distance, as the distance increases from 0.5–4 m by 1-m steps. Moreover, the energy at the receiving antenna decays drastically at a location of 4.5 m, which is caused by the increase of the NLoS path reflection. Experiments show that the CSI amplitude values decrease by more than 1.4 per meter. Therefore, we set this value as the amplitude threshold for different positions. At this point, we can accurately distinguish the client in different locations and degrees. It also avoids the instability of RSSI by combining CSI amplitude information. For a further explanation, we will describe in detail the specific Sybil attack model in Figure 7b to see if our algorithm can effectively detect the attacker.
For the case of Figure 1a, Client A falsifies the identity of Client B as node B and sends a request message to steal the returned data sent from AP 1. Since AP 1 receives the CSI phase information sent by node B , AP 1 can locate the client for the actual sending data by combining our improved MUSIC algorithm. That is, Client A is located in the direction of 30 . We can be sure that client B’should be identified as a Sybil node. Figure 1b and Figure 1a are similar, the only difference is that Client A and Client D are at the same angle, but have different radii. Thus, while our MUSIC algorithm can determine that D and D have the same angle, they have different RSSI values. Node D can also be determined as a Sybil node.
In the attack model of Figure 1c, when A falsifies a large number of Sybil nodes, AP 1 does not care about the contents of the packet sent by the virtual node and only determines the angle of the client based on the CSI by our algorithm. If the number of nodes does not affect Client B’s, Client C’s and Client D’s access to the network, we can determine that there are only four angles in the network sending the data, and they are at [ 30 , 150 , 60 , 120 ]. When Client B, Client C and Client D suffer from DoS attacks due to a large number of nodes, we can only detect that there is only one node in the network where the data are sent, and it is at 30 , so we can determine that the remaining nodes are Sybil nodes, which forged Client A.
However, the constant movement of attackers interferes with the channel phase information so that Sybil nodes’ AoA calculated by the self-adaptive MUSIC algorithm will change within a large area. Therefore, it cannot reflect the real AoA of the Sybil client movement. Moreover, when there is more than one client movement in the environment, the detection accuracy of the static detection algorithm will be reduced. Therefore, we propose a dynamic detection algorithm to solve the situation where there are movements of clients in the WLAN environment.

6. Dynamic Detection Algorithm

As we mentioned earlier, each client will not always remain stationary in an indoor wireless environment. Although our static detection algorithms are effective against Sybil attack in a static position, attackers may constantly move their position to change their channel characteristics, adding extra noise to the phase values. According to the literature [45], the CSI amplitude can sense the movement or gesture in the environment. Therefore, we can analyse the attack behaviour of malicious movement according to different fluctuation characteristics provided by different movement characteristics.
The CSI amplitude has a stable characteristic when there is no movement of the environment. Its value basically remained stable. However, the amplitude of CSI will exhibit periodic fluctuations as the device moves. Figure 8 shows that the amplitude of the physical layer varies differently for different activities. Because the waveform moves in the person or device, the reflection path will be produced in different ways. As a result, the peaks and valleys will add up or down in the same direction over a period of time. Both clients and attackers may exhibit some fluctuations in the real environment. In addition, each client moves at a different frequency, which will only respond to a particular change in amplitude waveform. Attackers will present extremely similar waveforms. As Sybil attacks fake nodes from the same physical node, the forged packet information and forged packet structure will not affect CSI amplitude changes.

6.1. Feature Extraction

We know that attackers’ movements have a specific behavioural trait. In fact, they launched such acts in order to avoid the static detection algorithm. It is a feature that attackers move their positions slightly to change the CSI phases. This is different from the actual client’s movements. The motion detection algorithm can detect the starting and ending moments of any client’s motion. What we need to do is to collect the datasets at each node attack and in the absence of an attack, according to different node characteristics.
Let X = x 1 , x 2 , x 3 , , x j , j = 200 . x j is the different client amplitude data within 2 s from start to end when there is no Sybil attack. x i is zero if there is no movement or no client access. We simulated the attack so that one of the nodes became a Sybil client, forging 50 attack nodes. Repeat the same action and the same kind of action in 2 s to get the dataset Y = y 1 , y 2 , y 3 , , y j , j = 200 . We calculate the eight statistical features in each of x i and y i from X and Y, which are the Maximum (Max), Minimum (Min), Variance (Var), Range, number of times the Signal Crosses the Mean value (MCR), the Standard deviation (Std), the Area under the signal curve (Area) and the total Number of Peaks and Valleys (NPV). We assume that each node has the same probability of moving. Let z = x j x j + 1 , then P ( z ) can be expressed as:
P ( z ) = c o u n t ( z > k ) c o u n t ( g = 1 ) · g 200 , g = g = 1 , i f x 0 . g = 0 , i f x = 0 .
The probability of other cases is 1 P ( z ) , so the entropy H(z) of different features is expressed as:
H z = [ p z l o g p z + 1 p z l o g ( 1 p z ) ]
The entropy of x and y is equally valid. Therefore, the information gain after launching the Sybil attack is I G z y | z x = H z y H z y | z x . IGfor normal situations can be calculated by I G z x + 1 | z x = H z x + 1 H z x + 1 | z x , and z x + 1 is the data increment that changes only one normal client to one attack node. At the same time, we also perform PCA processing on the data of 30 subcarriers after normalizing the data and select the first major feature and calculate its eight features. The results are shown in Table 1.
Because each node has the same probability of moving, the Sybil attack will generate a large number of attack nodes. Therefore, the probability of Sybil nodes occurring is higher than that of other nodes, and the information entropy increases as the attack nodes increase. As for the information gain, attack nodes faked by Sybil attacks belong to the same physical layer nodes. Therefore, once the attack exists, IG will remain almost unchanged. On the other hand, the dimensions of the 30 subcarriers are too redundant, and most of the motion-sensitive carriers are mostly fixed. The PCA-based method does not change the amplitude characteristics of the physical layer in the environment because of the Sybil attack. Therefore, in summary, it can be seen from Table 1 that the range and the total value of packs and valleys are consistent with the Sybil attack characteristic, so the two eigenvalues are selected as the input features. In fact, this is because attacks are less frequent, making the number of NPV per attack nodes be far less than the normal activity node, and the range is relatively large.

6.2. Density-Based Spatial Clustering of Applications with Noise

When the Sybil attack occurs, a large number of attack node amplitude samples is closely distributed. Moreover, the motion characteristics are different from those of normal nodes. However, we are not sure of the number of actual nodes in the environment, and there are nodes that are accessed and offline at any time. According to [45], in the frequency domain, the frequency is about 35–40 Hz, and the wavelength is 5.15 cm when a person equipped with any WiFi device in WLAN is walking. Its frequency range is 40–80 Hz when he or she falls. The frequency is 15–30 Hz when a person carries the WiFi device in WLAN standing up and sitting down. We define these moved WiFi devices for mobile clients. However, the attacks will be repeated periodically and mostly below the normal user behaviour frequency. The frequency is 2–5 Hz. Combined with experiment and feature selection results, we find that the time domain can provide richer motion characteristics when the amplitude is effectively filtered.
Usually, the attacker is at a low frequency. In fact, if the attacker moves more aggressively or if the mobile device user happens to perform a low-frequency movement, the frequency domain-based attack identification will be confused. However, in fact, there are many forged nodes in the Sybil attack. The main feature is that a large number of those nodes has the same physical layer characteristics. Therefore, based on this feature, we can calculate the attacker cluster of high density and effectively distinguish attackers and normal clients. The features NPV and range are more accurate than frequency and can display distinctly different clusters. However, they do not always stabilize for a particular value. Therefore, not every cluster is a spherical data distribution. We use Density-Based Spatial Clustering of Applications with Noise (DBSCAN) to cluster the Sybil attack nodes. DBSCAN is able to cluster the same movements in closely-spaced density into one cluster and does not need to enter the category number. What is more, it can find any shape of the cluster and noise points while clustering.
In detail, the core of DBSCAN is to find the largest set of samples with the highest density connected to each other by density-reachable relations. We cycle through all the packages within multiple time windows. The average of range and NPV is clustered in each time window. Because we use the 5-GHz wireless band, the sampling frequency can be set as 2500 packets/s, which ensures that each motion feature can be richly collected. Features will not change significantly within 1 s; therefore, the rectangular window length w s = 2500 . The motion features per second of m clients are r m + n · w s ; r m is client m’s features of the first second, and n is the data acquisition time in seconds. If the data length is less than the length of the window, it is considered as unavailable data. The input is:
W = r 1 , r 1 + w s r 1 + n · w s , r 2 , r 2 + w s , , r 2 + n · w s , , r m + n · w s , r R 2
The output is the cluster number C. The ε -neighbourhood is the Euclidean distance between every two samples; the threshold is ε ; and MinPts is the minimum number of pairs in the neighbourhood. If it is greater than this number, the point is the core point. Then, the same cluster can be reached by density-reachable and density-direct means. The algorithm is shown in detail in Algorithm 1.
Algorithm 1: Density-based spatial clustering of applications with noise.
Sensors 18 00878 i001
The function query is to query the number of points in the neighbourhood of r. Algorithm 1 calculates the final result of DBSCAN, which is the clustering cluster and the density-reachable points within each cluster. Algorithm 2 belongs to Algorithm 1, which is the core of DBSCAN. Algorithm 2 calculates all the density-reachable points of all the neighbourhood core points. It is assumed that the AP collects the amplitude characteristics of M clients by receiving CSI. If these movement nodes have different MAC addresses, there is no behaviour such that Sybil nodes copy the real node’s MAC address, but it can not prove that there is no Sybil attack. An attacker can randomly forge large numbers of MAC addresses that do not exist in the network. We need further validation, therefore, if the number of clusters calculated by Algorithm 1 is less than M, then the clusters with higher density can be regarded as forged Sybil nodes. If there is a different client with the same MAC address, we can determine that there is a Sybil attack on the network. Sybil nodes in W can also be returned by Algorithm 1.
The only difference between the common motion feature and the attack motion feature is that in the same time window, the forged attack nodes are all from the same attacker, so the density within the attack cluster is much higher than that of the common motion nodes.
Algorithm 2: Calculate all density-reachable points of core points.
Sensors 18 00878 i002

7. Experimental Evaluation

Our experimental environment is a 6.35 m × 8.5 m meeting room. Receivers and transmitters are mini-PCs equipped with Intel 5300 WiFi NICs. They all contain three antennas. We use one antenna at the transmitter and three antennas at the receiver. We only employed one receiver. We installed CSI tools [46] on these mini-PCs, which can receive the CSI of 30 subcarriers. In order to eliminate the interference in the environment, while further reducing the impact of phase offsets, we use the monitor mode and 5.32-GHz band. Our system can not only work in the 5-GHz band, but also in the 2.4-GHz band. We only need the centre AP equipment with WiFi NICs, which can receive CSI signals. Regardless of whether sending any type of WiFi device and any type of packet, we can receive the CSI when it accesses the wireless network and sends it to the transmitter. We use the same experimental environment for both dynamic and static detection algorithms.
We conducted a total of five sets of experiments on Sybil attack detection from static and dynamic scenarios, respectively. Three of them are static attack detection experiments, which are respectively the AoA accuracy comparison of different algorithms, the AoA error estimation of different packets and access points and the detection accuracy of different types of Sybil nodes in a static scenario. Dynamic attack detection experiments include two sets, that is the accuracy of the DBSCAN clustering algorithm and the detection accuracy of Sybil nodes.
In detail, we test an AP and mobile phone, which support the 802.11a/c protocol, as the AoA of the transmitter and use the mini-PC with the Intel 5300 network card as the receiver. In the static detection algorithm, the AoA value is set according to the experimental threshold, and the RSSI and amplitude detection threshold are combined to verify the efficiency of our Sybil node detection algorithm. We then use MATLAB simulation to increase the number of Sybil attacks compared to the RSSI attack detection methods. When applying dynamic detection algorithms, we let the client implement a variety of motions and verify the accuracy of the DBSCAN algorithm separately. Then, we increase the number of movement attack nodes and verify that the algorithm is still able to effectively detect when there are many kinds of movement patterns in the environment.

7.1. Angle of Arrival Estimation Accuracy of Different Clients

In this part of the experiment, we tested AoA’s accuracy on 5G band clients, including APs and mobile phones. Let the transmitter be at 11 degrees, which ranges from 15 165 by steps of 15 . The distance between the transmitter and the receiver is 3 m. After collecting the CSI data, we changed the distance to 2 m and carried out the same experiment. Through our improved MUSIC algorithm, we can determine the inherent phase offsets 8 , 20 of Antennas 2 and 3. Figure 9a shows the error bar of the traditional MUSIC algorithm and our algorithm in different angles’ measured data, which randomly selected 300 packets. We can see that the average of our algorithm is almost the same as the true angle with the average error being 6.3 , but the average error of the traditional operator is 11.9 . For mobile phone testing, we changed the experimental environment to the office, filled with desks and computers. The size is about 64 m 2 . Then, we put the phone and the antennas at the same level of height and adjusted the distance between the receiving antennas to 6 cm to prevent interference between the receiving antennas. Due to the many obstacles in the environment, we are making sure that the external environment has not changed. On the semicircle with a distance of 1 m, we changed the position of the mobile phone [ 30 , 45 , 60 , 90 , 120 , 135 , 150 ] as the measurement angles, respectively. Figure 9b shows that we can also effectively detect the angle of the phone in the wireless network with an accuracy of 7 . 2 . The average RSSI difference in different locations is 1.6 dB.
Figure 10a shows the AOA’s CDF estimate error with all APs, and we can see that 80% of the AP’s detection error in 300 packets does not exceed 10 , whereas the traditional algorithm is only 50%. We simulate the number of different packages as shown in Figure 10b, and the experiment shows that our algorithm can effectively improve the positioning accuracy with the CSI packets’ increase. The average RSSI of 8000 packets, shows that the difference between 2 m and 3 m is 1.3 dB. The CSI amplitude values decrease by more than 1.4 per meter.

7.2. Detection of Sybil Nodes in the Static Scenario

In the same experimental environment, 20 sets of different nodes are randomly arranged at positions of 2, 3, 4 and 5 m and the angles of [ 30 , 60 , 90 , 120 ] for Sybil attack detection. According to our Sybil attack model for multiple experiments, we set 6.3 degrees as the AoA threshold, 1.3 dB as the RSSI threshold and 1.4 as the amplitude threshold. Because we only use one AP as a detection node, the RSSI-based Sybil attack detection efficiency is 76.5%; whereas our detection system based on CSI has a detection rate of 100%. The experimental results have a relatively high accuracy, due to the large differences between the angles of different locations, and the test dataset is relatively small. However, this proves that the accuracy of our measurement is much higher than RSSI. For further research, we assume that we can detect the nodes in the error range of AoA, RSSI and CSI amplitude based on the above ideal environment.
In order to further explore, we use MATLAB to randomly generate a large number of nodes with AoA, RSSI and CSI amplitude. We set 500 WiFi clients randomly and simulate Sybil attacks 200 times. We can detect whether the Sybil attacks occur accurately or not as the Sybil nodes increase. Figure 11a shows the detection rate of the virtual Sybil nodes generated by Sybil clients. We can see that our algorithm can achieve an average detection efficiency of 98.5% for the Sybil nodes, and the RSSI detection method can only achieve 79.8%. We define that the identities of multiple fake Sybil nodes in spoofing attack are all the real clients existing in the network. With the number of spoofing clients’ Sybil nodes increasing, Figure 11b shows the probability that each node is detected by a spoofing attack. When the spoofing nodes are four, our detection efficiency is 94.2%. With the increase in spoofing at the same time, our accuracy is gradually declining. When a client is virtual out of 40 Sybil nodes, we cannot accurately distinguish every node generated by clients of spoofing attacks. However, we can still know that some nodes are being attacked. Spoofing attack detection needs to detect all fake nodes, which is a factor that limits the detection rate. Therefore, as long as there is a node that has not been accurately detected, we think that the entire test is a failure.

7.3. Accuracy of DBSCAN Clustering Algorithm

Each client connected to the central AP is a normal client and does not initiate a Sybil attack. Clients perform 12 different types of periodic movements or rest at random locations for 10 s, respectively, when connecting the central AP, including walking fast and slowly in a small area, sitting down fast and slowly, jumping, running in place, boxing, fighting, turning quickly and slowly, crouch and moving slightly (simulating an attacker’s behaviour). So far, we have collected a validation dataset through which we can verify the clustering characteristics and attack detection accuracy of the dynamic detection algorithm when there are multiple motions in the environment.
Figure 12 shows the DBSCAN clustering algorithm’s accuracy when there are different numbers of mobile clients. The algorithm can distinguish the different categories with an accuracy of over 82.7% when there are seven and fewer movements. However, when there are more than seven types of client movements, the accuracy of the clustering and the purity of the clusters are drastically reduced. At the same time, there are no more than seven kinds of movements in most cases of WLAN. The most obvious features of those movements are walking fast and slow, jumping, turning quickly and slowly, moving slightly and sitting down slowly. The purity of these clusters is higher than 0.81, which can be used as a basis for the dynamic attack detection of client actions. The limitation is that these clients cannot move too far away from the original position, and their motions need to be consistent. Therefore, the DBSCAN algorithm can effectively distinguish the usual movement in the indoor WLAN environment. At the same time, when the number of motions increases by more than seven, some nodes will gather, reducing the detection accuracy due to the similar amplitude characteristics of other clients.

7.4. Detection of Sybil Nodes in the Dynamic Scenario

When simulating Sybil attacks, we allow attack clients to access and leave APs within a certain number of times. Attack clients forge multiple nodes and periodically move in their location. Similarly, we make other clients move randomly, and the attacker also makes periodic dynamic attacks at a specific time. We collect a total of 12 datasets each for 10 s. We calculate the Euclidean distance between each feature point and all other points to get the ε -distance set and then sort them in ascending order. We use a scatter plot to show the ε -distance trend and finally determine the value of the radius MinPts based on this. Finally, we get the optimal clustering parameters (0.5, 30). At this point, the clustering effect of attacks is most obvious, and according to the dataset, we can see that the clustering clusters of motion features of a single client will not exceed 120. Then, we set the value as a threshold. When the cluster is above the threshold, it is determined that the node in the cluster is the attacking node. The number of types of motion in each dataset is fixed.
Therefore, we also increase the variety of clients in the environment to move in different ways and increase the number of fake attack nodes, as shown in Figure 13. Experiments show that the more attack nodes, the greater the density of their clusters, so the accuracy of attack detection increases with the number of attack nodes. Especially when there are five clients moving in the environment and fewer than 250 forged nodes, the overall average detection efficiency is 99.5%. This is because attack nodes forged by the actual attacker fluctuate within a small area and cannot be connected to other types of clusters. The attack detection rate remains high despite the increase in attack nodes. As the number of mobile clients increased to 9, 11and the number of forged attack nodes was less than 200, the algorithm could not cluster all the nodes accurately, but still could detect a large number of simulated nodes with the detection rate still above 75%. However, with the increase of simulated attack nodes, some large density clusters will swallow many small clusters. Algorithms are easier to cluster into one. This misjudgement makes the detection accuracy drop acutely.
In conclusion, the dynamic detection algorithm can maintain a high detection accuracy for less than 250 attacker forged nodes and meanwhile can achieve an average detection accuracy of 99.5% when there are less than five kinds of motion in the environment.

8. Conclusions

Aiming at privacy leakage, identity theft and wireless DoS attacks that Sybil attacks may bring, this paper proposes a detection system that can detect Sybil attacks based on fine-grained physical layer channel state information. Moreover, in this system, we combine the self-adaptive MUSIC algorithm with the CSI amplitude for static attacks and propose a detailed feature extraction method with DBSCAN to detect dynamic attacks. Experiments show that the system can achieve a high detection rate for both static attacks and dynamic attacks. According to our experimental results, the average detection rate of the static algorithm is 98.5%, and the average detection rate of the dynamic algorithm is 99.5% as long as no more than five clients are moving. However, the dynamic detection algorithm is greatly disturbed by the environment. When people without WiFi devices are moving in WLAN, this will affect the acquisition of data and the detection accuracy. At present, we cannot effectively distinguish the movement without the WiFi device, which will be carried out in our future work.

Acknowledgments

Our work was supported by the Foundation of the Educational Commission of Tianjin, China (Grant No. 20130801), the General Project of Tianjin Municipal Science and Technology Commission under Grant No. 15JCYBJC15600, the Major Project of Tianjin Municipal Science and Technology Commission under Grant No. 15ZXDSGX00030, NSFC: The United Foundation of General Technology and Fundamental Research (No. U1536122), the National Natural Science Foundation of China (No. 61672300) and the National Natural Science Foundation of Tianjin (No. 16JCYBJC15500).

Author Contributions

Chundong Wang, Likun Zhu and Liangyi Gong conceived of and designed the study. Liangyi Gong, Zhentang Zhao and Lei Yang conceived of and designed the experiments. Chundong Wang, Likun Zhu and Liangyi Gong performed the experiments. Zheli Liu, Xiaochun Cheng and Lei Yang analysed the data. Likun Zhu wrote the paper. Chundong Wang, Liangyi Gong, Zheli Liu and Xiaochun Cheng reviewed and edited the manuscript. All authors read and approved the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Mitchell, C. Security Analysis and Improvements for IEEE 802.11 i. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS’05), San Diego, CA, USA, 3–4 February 2005; Stanford University: Stanford, CA, USA, 2005; pp. 90–110. [Google Scholar]
  2. Douceur, J.R. The Sybil attack. In Proceedings of the International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, 7–8 March 2002; Springer: New York, NY, USA, 2002; pp. 251–260. [Google Scholar]
  3. Zhang, H.; Cheng, P.; Shi, L.; Chen, J. Optimal DoS attack scheduling in wireless networked control system. IEEE Trans. Control Syst. Technol. 2016, 24, 843–852. [Google Scholar] [CrossRef]
  4. Demirbas, M.; Song, Y. An RSSI-based scheme for Sybil attack detection in wireless sensor networks. In Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, Buffalo NY, USA, 26–29 June 2006; IEEE Computer Society: Washington, DC, USA, 2006; pp. 564–570. [Google Scholar]
  5. Wang, J.; Yang, G.; Sun, Y.; Chen, S. Sybil attack detection based on RSSI for wireless sensor network. In Proceedings of the IEEE International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, Shanghai, China, 21–25 September 2007; pp. 2684–2687. [Google Scholar]
  6. Jan, M.A.; Nanda, P.; He, X.; Liu, R.P. A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network. In Proceedings of the IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; Volume 1, pp. 318–325. [Google Scholar]
  7. Garip, M.T.; Kim, P.H.; Reiher, P.; Gerla, M. INTERLOC: An interference-aware RSSI-based localization and Sybil attack detection mechanism for vehicular ad hoc networks. In Proceedings of the IEEE 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017; pp. 1–6. [Google Scholar]
  8. Deak, G.; Curran, K.; Condell, J. Filters for RSSI-based measurements in a Device-free Passive Localisation Scenario. Image Process. Commun. 2010, 15, 23–34. [Google Scholar]
  9. Vasisht, D.; Kumar, S.; Katabi, D. Decimeter-Level Localization with a Single WiFi Access Point. In Proceedings of the NSDI, Santa Clara, CA, USA, 16–18 March 2016; pp. 165–178. [Google Scholar]
  10. Kotaru, M.; Joshi, K.; Bharadia, D.; Katti, S. Spotfi: Decimeter level localization using wifi. In Proceedings of the ACM SIGCOMM Computer Communication Review, London, UK, 17–21 August 2015; ACM: New York, NY, USA, 2015; Volume 45, pp. 269–282. [Google Scholar]
  11. Wang, C.; Zhu, L.; Gong, L.; Zhao, Z.; Yang, L.; Liu, Z.; Cheng, X. Channel State Information-Based Detection of Sybil Attacks in Wireless Networks. J. Internet Serv. Inf. Secur. 2018, 8, 2–17. [Google Scholar]
  12. Sen, S.; Radunovic, B.; Choudhury, R.R.; Minka, T. You are facing the Mona Lisa: Spot localization using PHY layer information. In Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Lake District, UK, 25–29 June 2012; ACM: New York, NY, USA, 2012; pp. 183–196. [Google Scholar]
  13. Zhang, W.; Hoorfar, A.; Li, L. Through-the-wall target localization with time reversal music method. Prog. Electromagn. Res. 2010, 106, 75–89. [Google Scholar] [CrossRef]
  14. Gjengset, J.; Xiong, J.; McPhillips, G.; Jamieson, K. Phaser: Enabling phased array signal processing on commodity WiFi access points. In Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, Maui, HI, USA, 7–11 September 2014; ACM: New York, NY, USA, 2014; pp. 153–164. [Google Scholar]
  15. Gan, J.; Tao, Y. DBSCAN Revisited. In Proceedings of the ACM SIGMOD International Conference, Melbourne, Australia, 31 May–4 June 2015; pp. 519–530. [Google Scholar]
  16. Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 2003, 1, 293–315. [Google Scholar] [CrossRef]
  17. Newsome, J.; Shi, E.; Song, D.; Perrig, A. The Sybil attack in sensor networks: Analysis & defences. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, 26–27 April 2004; ACM: New York, NY, USA, 2004; pp. 259–268. [Google Scholar]
  18. Zhang, Y.; Liu, W.; Lou, W.; Fang, Y. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 2006, 24, 247–260. [Google Scholar] [CrossRef]
  19. Dhamodharan, U.S.R.K.; Vayanaperumal, R. Detecting and preventing Sybil attacks in wireless sensor networks using message authentication and passing method. Sci. World J. 2015, 2015. [Google Scholar] [CrossRef] [PubMed]
  20. Pecori, R.; Veltri, L. 3AKEP: Triple-Authenticated Key Exchange Protocol for Peer-to-Peer VoIP Applications. Comput. Commun. 2016, 85, 28–40. [Google Scholar] [CrossRef]
  21. Pecori, R. S-Kademlia: A trust and reputation method to mitigate a Sybil attack in Kademlia. Comput. Netw. 2016, 94, 205–218. [Google Scholar] [CrossRef]
  22. Ishida, T.; Hirohara, Y.; Uchida, N.; Shibata, Y. Implementation of an Integrated Disaster Information Cloud System for Disaster Control. J. Internet Serv. Inf. Secur. 2017, 7, 1–20. [Google Scholar]
  23. Cui, B.; Liu, Z.; Wang, L. Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans. Comput. 2016, 65, 2374–2385. [Google Scholar] [CrossRef]
  24. Liu, Z.; Chen, X.; Yang, J.; Jia, C.; You, I. New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 2016, 59, 198–207. [Google Scholar] [CrossRef]
  25. Liu, Z.; Li, T.; Li, P.; Jia, C.; Li, J. Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener. Comput. Syst. 2018, 78, 778–788. [Google Scholar] [CrossRef]
  26. Liu, Z.; Huang, Y.; Li, J.; Cheng, X.; Shen, C. DivORAM: Towards a Practical Oblivious RAM with Variable Block Size. Information Sciences. Inf. Sci. 2018, 447. [Google Scholar] [CrossRef]
  27. Xu, Q.; Zheng, R.; Saad, W.; Han, Z. Device fingerprinting in wireless networks: Challenges and opportunities. IEEE Commun. Surv. Tutor. 2016, 18, 94–104. [Google Scholar] [CrossRef]
  28. Park, S.; Aslam, B.; Turgut, D.; Zou, C.C. Defense against Sybil attack in the initial deployment stage of vehicular ad hoc network based on roadside unit support. Secur. Commun. Netw. 2013, 6, 523–538. [Google Scholar] [CrossRef]
  29. Shen, J.; Chang, S.; Shen, J.; Liu, Q.; Sun, X. A lightweight multi-layer authentication protocol for wireless body area networks. Future Gener. Comput. Syst. 2016, 78, 956–963. [Google Scholar] [CrossRef]
  30. Shi, W.; Liu, S.; Zhang, Z. A Lightweight Detection Mechanism against Sybil Attack in Wireless Sensor Network. KSII Trans. Internet Inf. Syst. 2015, 9. [Google Scholar] [CrossRef]
  31. Gu, P.; Khatoun, R.; Begriche, Y.; Serhrouchni, A. k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks. In Proceedings of the IEEE 2017 Third International Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, FL, USA, 11–12 February 2017; pp. 1–6. [Google Scholar]
  32. Gu, P.; Khatoun, R.; Begriche, Y.; Serhrouchni, A. Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks. In Proceedings of the 2017 IEEE Wireless Communications and Networking Conference (WCNC), San Francisco, CA, USA, 19–22 March 2017; pp. 1–6. [Google Scholar]
  33. Wen, M.; Li, H.; Zheng, Y.F.; Chen, K.F. TDOA-based Sybil attack detection scheme for wireless sensor networks. J. Shanghai Univ. 2008, 12, 66–70. [Google Scholar] [CrossRef]
  34. Zhang, Y.; Fan, K.; Zhang, S.; Mo, W. AOA based trust evaluation scheme for Sybil attack detection in WSN. Appl. Res. Comput. 2010, 27, 1847–1849. [Google Scholar]
  35. Yu, B.; Xu, C.Z.; Xiao, B. Detecting Sybil attacks in VANETs. J. Parallel Distrib. Comput. 2013, 73, 746–756. [Google Scholar] [CrossRef]
  36. Liu, Y.; Bild, D.R.; Dick, R.P.; Mao, Z.M.; Wallach, D.S. The Mason test: A defence against Sybil attacks in wireless networks without trusted authorities. IEEE Trans. Mob. Comput. 2015, 14, 2376–2391. [Google Scholar] [CrossRef]
  37. Feng, X.; Li, C.Y.; Chen, D.X.; Tang, J. EBRS: Event Based Reputation System for Defensing Multi-Source Sybil Attacks in VANET; Springer International Publishing: New York, NY, USA, 2015; pp. 145–154. [Google Scholar]
  38. Liu, R.; Wang, Y. A New Sybil Attack Detection for Wireless Body Sensor Network. In Proceedings of the Tenth International Conference on Computational Intelligence and Security, Kunming, China, 15–16 November 2014; pp. 367–370. [Google Scholar]
  39. Xiao, L.; Greenstein, L.J.; Mandayam, N.B.; Trappe, W. Channel-based detection of Sybil attacks in wireless networks. IEEE Trans. Inf. Forensics Secur. 2009, 4, 492–503. [Google Scholar] [CrossRef]
  40. Zhang, J.; Tang, J.; Wang, T.; Chen, F. Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks. Int. J. Sens. Netw. 2017, 23, 248–257. [Google Scholar] [CrossRef]
  41. Zhang, Y.; Sun, X.; Wang, B. Efficient algorithm for k-barrier coverage based on integer linear programming. China Commun. 2016, 13, 16–23. [Google Scholar] [CrossRef]
  42. Jamshidi, M.; Zangeneh, E.; Esnaashari, M.; Meybodi, M.R. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Comput. Electr. Eng. 2016, 64, 220–232. [Google Scholar] [CrossRef]
  43. Schmidt, R. Multiple emitter location and signal parameter estimation. IEEE Trans. Antennas Propag. 1986, 34, 276–280. [Google Scholar] [CrossRef]
  44. Xiong, J.; Jamieson, K. Arraytrack: A Fine-Grained Indoor Location System; USENIX: Berkeley, CA, USA, 2013. [Google Scholar]
  45. Wang, W.; Liu, A.X.; Shahzad, M.; Ling, K.; Lu, S. Device-Free Human Activity Recognition Using Commercial WiFi Devices. IEEE J. Sel. Areas Commun. 2017, 35, 1118–1131. [Google Scholar] [CrossRef]
  46. Halperin, D.; Hu, W.; Sheth, A.; Wetherall, D. Tool release: Gathering 802.11 n traces with channel state information. ACM SIGCOMM Comput. Commun. Rev. 2011, 41, 53. [Google Scholar] [CrossRef]
Figure 1. Sybil attack models. (a) Attack for different angles; (b) attack for the same angles; (c) a large number of Sybil nodes.
Figure 1. Sybil attack models. (a) Attack for different angles; (b) attack for the same angles; (c) a large number of Sybil nodes.
Sensors 18 00878 g001
Figure 2. Different methods of measuring the angle of arrival. (a) Traditional MUSIC Algorithm; (b) self-Adaptive MUSIC Algorithm.
Figure 2. Different methods of measuring the angle of arrival. (a) Traditional MUSIC Algorithm; (b) self-Adaptive MUSIC Algorithm.
Sensors 18 00878 g002
Figure 3. Overview of the Sybil attack detection system. CSI, Channel State Information.
Figure 3. Overview of the Sybil attack detection system. CSI, Channel State Information.
Sensors 18 00878 g003
Figure 4. Sybil attack detection system of multiple detection APs.
Figure 4. Sybil attack detection system of multiple detection APs.
Sensors 18 00878 g004
Figure 5. Different data processing methods. (a) Low pass filter; (b) PCA; (c) Savitzky–Golay (SG) filter.
Figure 5. Different data processing methods. (a) Low pass filter; (b) PCA; (c) Savitzky–Golay (SG) filter.
Sensors 18 00878 g005
Figure 6. Motion detection of different packets. (a) Client from static to moving; (b) variance; (c) variance rate of changes.
Figure 6. Motion detection of different packets. (a) Client from static to moving; (b) variance; (c) variance rate of changes.
Sensors 18 00878 g006
Figure 7. Amplitude and RSSI of different distances. (a) RSSI of different distances; (b) amplitude of different distances.
Figure 7. Amplitude and RSSI of different distances. (a) RSSI of different distances; (b) amplitude of different distances.
Sensors 18 00878 g007
Figure 8. Different activities in the environment.
Figure 8. Different activities in the environment.
Sensors 18 00878 g008
Figure 9. AoA Error bar of different clients. (a) Error bar of access points; (b) error bar of mobile devices.
Figure 9. AoA Error bar of different clients. (a) Error bar of access points; (b) error bar of mobile devices.
Sensors 18 00878 g009
Figure 10. AoA Estimation error. (a) CDF of access points; (b) CDF of access points of different packets.
Figure 10. AoA Estimation error. (a) CDF of access points; (b) CDF of access points of different packets.
Sensors 18 00878 g010
Figure 11. Different attacks’ Sybil node detection rate. (a) Sybil attacks’ Sybil node detection rate; (b) spoofing attacks’ Sybil node detection rate.
Figure 11. Different attacks’ Sybil node detection rate. (a) Sybil attacks’ Sybil node detection rate; (b) spoofing attacks’ Sybil node detection rate.
Sensors 18 00878 g011
Figure 12. Different mobile clients in the environment.
Figure 12. Different mobile clients in the environment.
Sensors 18 00878 g012
Figure 13. Dynamic Sybil attack detection rates for different mobile clients.
Figure 13. Dynamic Sybil attack detection rates for different mobile clients.
Sensors 18 00878 g013
Table 1. Effect of the attack on various feature selection schemes. MCR, number of times the Signal Crosses the Mean value; NPV, the total Number of Peaks and Valleys.
Table 1. Effect of the attack on various feature selection schemes. MCR, number of times the Signal Crosses the Mean value; NPV, the total Number of Peaks and Valleys.
Normal State
FeaturesMinMaxVarRangeMCRStdAreaNPV
Schemes
I0.0400.0390.0590.0820.1290.1860.2460.048
IG0.0190.0210.0420.0450.0850.1060.1900.039
PCA3.350−1.5301.7124.88031.3111.2154
Attack State
I0.0510.0380.0850.1430.1350.1930.2080.151
IG0.0450.0290.0270.0540.1260.0870.1150.040
PCA3.490−1.3402.1324.83041.4620.7004

Share and Cite

MDPI and ACS Style

Wang, C.; Zhu, L.; Gong, L.; Zhao, Z.; Yang, L.; Liu, Z.; Cheng, X. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information. Sensors 2018, 18, 878. https://doi.org/10.3390/s18030878

AMA Style

Wang C, Zhu L, Gong L, Zhao Z, Yang L, Liu Z, Cheng X. Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information. Sensors. 2018; 18(3):878. https://doi.org/10.3390/s18030878

Chicago/Turabian Style

Wang, Chundong, Likun Zhu, Liangyi Gong, Zhentang Zhao, Lei Yang, Zheli Liu, and Xiaochun Cheng. 2018. "Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information" Sensors 18, no. 3: 878. https://doi.org/10.3390/s18030878

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop