Innovative survey of defense machinery against sybil attacks over wireless ad-hoc network on IoT
Abstract
Integrating IoT with Wireless Ad-hoc Network (WANET) capabilities can solve several problems. However, because they both rely on identity nodes to communicate with each other, they are both vulnerable to Sybil Attack. Sybil attackers illegally change into several different identities to carry out various malicious activities such as damaging data aggregation, voting, and disrupting routing. Several defense machineries have been proposed for Sybil attacks on WANET, which are mostly based on cryptography, location/position, network behavior, resource testing, and trust. However, the drawbacks are that not all machinery are suitable for use in networks with limited resources. In this paper, we present a survey, classification, and comparison of various defense machinery that have been proposed for non-IoT WANETs. We emphasize the issue of how the advantages and disadvantages of this defense mechanism when applied to the IoT infrastructure and how each method can effectively recognized properties of Sybil attack. The purpose of this paper is to promote research so that it can resolve several issues for later consideration in the design of Sybil's next defense mechanism.