Show simple item record

dc.contributor.authorLiu, Yue
Bild, David R.
Dick, Robert P.
Mao, Z. Morley
Wallach, Dan S.
dc.date.accessioned 2016-06-22T16:28:31Z
dc.date.available 2016-06-22T16:28:31Z
dc.date.issued 2015
dc.identifier.citation Liu, Yue, Bild, David R., Dick, Robert P., et al.. "The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities." IEEE Transactions on Mobile Computing, 14, no. 11 (2015) IEEE: 2376-2391. http://dx.doi.org/10.1109/TMC.2015.2398425.
dc.identifier.urihttps://hdl.handle.net/1911/90518
dc.description.abstract Wireless networks are vulnerable to Sybil attacks, in which a malicious node poses as many identities in order to gain disproportionate influence. Many defenses based on spatial variability of wireless channels exist, but depend either on detailed, multi-tap channel estimation-something not exposed on commodity 802.11 devices-or valid RSSI observations from multiple trusted sources, e.g., corporate access points-something not directly available in ad hoc and delay-tolerant networks with potentially malicious neighbors. We extend these techniques to be practical for wireless ad hoc networks of commodity 802.11 devices. Specifically, we propose two efficient methods for separating the valid RSSI observations of behaving nodes from those falsified by malicious participants. Further, we note that prior signalprint methods are easily defeated by mobile attackers and develop an appropriate challenge-response defense. Finally, we present the Mason test, the first implementation of these techniques for ad hoc and delay-tolerant networks of commodity 802.11 devices. We illustrate its performance in several real-world scenarios.
dc.language.iso eng
dc.publisher IEEE
dc.rights Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.
dc.title The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities
dc.type Journal article
dc.citation.journalTitle IEEE Transactions on Mobile Computing
dc.citation.volumeNumber 14
dc.citation.issueNumber 11
dc.type.dcmi Text
dc.identifier.doihttp://dx.doi.org/10.1109/TMC.2015.2398425
dc.type.publication publisher version
dc.citation.firstpage 2376
dc.citation.lastpage 2391


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record