首页> 外文期刊>Mobile Computing, IEEE Transactions on >The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
【24h】

The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities

机译:梅森测试:防御没有可信机构的无线网络中的Sybil攻击

获取原文
获取原文并翻译 | 示例

摘要

Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation—something not exposed on commodity 802.11 devices—or valid RSSI observations from multiple trusted sources, e.g., corporate access points—something not directly available in ad hoc and delay-tolerant networks with potentially malicious neighbors. We extend these techniques to be practical for wireless ad hoc networks of commodity 802.11 devices. Specifically, we propose two efficient methods for separating the valid RSSI observations of behaving nodes from those falsified by malicious participants. Further, we note that prior signalprint methods are easily defeated by mobile attackers and develop an appropriate challenge-response defense. Finally, we present the Mason test, the first implementation of these techniques for ad hoc and delay-tolerant networks of commodity 802.11 devices. We illustrate its performance in several real-world scenarios.
机译:无线网络容易受到Sybil攻击的攻击,在这种攻击中,恶意节点会摆出同样多的身份,以获得不成比例的影响。存在许多基于无线信道的空间可变性的防御措施,但是这些防御措施要么取决于详细的多抽头信道估计(某些商品802.11设备未公开这些东西),要么取决于来自多个受信任源(例如公司接入点)的有效RSSI观测值(某些东西无法直接获得)在具有潜在恶意邻居的ad hoc和延迟容忍网络中。我们将这些技术扩展为适用于商用802.11设备的无线ad hoc网络。具体来说,我们提出了两种有效的方法,用于将行为节点的有效RSSI观察结果与被恶意参与者伪造的那些节点分开。此外,我们注意到,现有的信号打印方法很容易被移动攻击者击败,并发展出适当的挑战响应防御。最后,我们介绍了Mason测试,这是针对商用802.11设备的即席和延迟容忍网络的这些技术的首次实现。我们将说明它在几种实际情况下的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号