Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks

Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks th...

Full description

Bibliographic Details
Main Authors: Arne Bochem, Benjamin Leiding
Format: Article
Language:English
Published: MDPI AG 2021-05-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/21/9/3257
id doaj-d22a1f0b321d49c5a78e973a02a84bf1
record_format Article
spelling doaj-d22a1f0b321d49c5a78e973a02a84bf12021-05-31T23:27:11ZengMDPI AGSensors1424-82202021-05-01213257325710.3390/s21093257Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc NetworksArne Bochem0Benjamin Leiding1Institute of Computer Science, University of Goettingen, 37077 Goettingen, GermanyInstitute for Software and Systems Engineering, Clausthal University of Technology, 38678 Clausthal-Zellerfeld, GermanyToday, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.https://www.mdpi.com/1424-8220/21/9/3257Internet of ThingsIdentitysecurityauthenticationSybil attackblockchain
collection DOAJ
language English
format Article
sources DOAJ
author Arne Bochem
Benjamin Leiding
spellingShingle Arne Bochem
Benjamin Leiding
Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
Sensors
Internet of Things
Identity
security
authentication
Sybil attack
blockchain
author_facet Arne Bochem
Benjamin Leiding
author_sort Arne Bochem
title Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
title_short Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
title_full Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
title_fullStr Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
title_full_unstemmed Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad Hoc Networks
title_sort rechained: sybil-resistant distributed identities for the internet of things and mobile ad hoc networks
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2021-05-01
description Today, increasing Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks that are deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and manipulate its behavior according to the attacker’s goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities, and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.
topic Internet of Things
Identity
security
authentication
Sybil attack
blockchain
url https://www.mdpi.com/1424-8220/21/9/3257
work_keys_str_mv AT arnebochem rechainedsybilresistantdistributedidentitiesfortheinternetofthingsandmobileadhocnetworks
AT benjaminleiding rechainedsybilresistantdistributedidentitiesfortheinternetofthingsandmobileadhocnetworks
_version_ 1721417547924897792