Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks

2018 | book part. A publication with affiliation to the University of Göttingen.

Jump to: Cite & Linked | Documents & Media | Details | Version history

Cite this publication

​Unchained Identities: Putting a Price on Sybil Nodes in Mobile Ad Hoc Networks​
Bochem, A. ; Leiding, B.  & Hogrefe, D. ​ (2018)
In:​Beyah, R.; Chang, B.; Li, Y.; Zhu, S.​ (Eds.), Security and Privacy in Communication Networks pp. 358​-374. (Vol. 254). ​Cham: ​Springer. DOI: https://doi.org/10.1007/978-3-030-01701-9_20 

Documents & Media

License

GRO License GRO License

Details

Authors
Bochem, Arne ; Leiding, Benjamin ; Hogrefe, Dieter 
Editors
Beyah, R.; Chang, B.; Li, Y.; Zhu, S.
Abstract
As mobile ad hoc networks (MANETs) and similar decentralized, self-organizing networks grow in number and popularity, they become worthwhile targets for attackers. Sybil attacks are a widespread issue for such networks and can be leveraged to increase the impact of other attacks, allowing attackers to threaten the integrity of the whole network. Authentication or identity management systems that prevent users from setting up arbitrary numbers of nodes are often missing in MANETs. As a result, attackers are able to introduce nodes with a multitude of identities into the network, thereby controlling a substantial fraction of the system and undermining its functionality and security. Additionally, MANETs are often partitioned and lack Internet access. As a result, implementing conventional measures based on central authorities is difficult. This paper fills the gap by introducing a decentralized blockchain-based identity system called Unchained. Unchained binds identities of nodes to addresses on a blockchain and economically disincentivizes the production of spurious identities by raising the costs of placing large numbers of Sybil identities in a network. Care is taken to ensure that circumventing Unchained results in costs similar or higher than following the protocol. We describe an offline verification scheme, detail the functionalities of the concept, discuss upper- and lower-bounds of security guarantees and evaluate Unchained based on case-studies.
Issue Date
2018
Publisher
Springer
Series
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 
ISBN
978-3-030-01700-2
978-3-030-01701-9
ISSN
1867-8211; 1867-822X
Language
English

Reference

Citations


Social Media