Supplementary data for "Rechained: Sybil-Resistant Distributed Identities for the Internet of Things and Mobile Ad hoc Networks"

Citation Author(s):
Arne
Bochem
University of Goettingen
Benjamin
Leiding
University of Goettingen
Submitted by:
Arne Bochem
Last updated:
Wed, 07/29/2020 - 09:55
DOI:
10.21227/e5tk-3y77
Data Format:
License:
0
0 ratings - Please login to submit your rating.

Abstract 

Today, more and more Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks deployed in scenarios with irregular or unreliable Internet connectivity. The lack of a central authority that can be contacted at any time allows attackers to introduce arbitrary amounts of nodes into the network and to manipulate its behavior according to the attacker's goals, by posing as a majority participant. Depending on the structure of the network, employing Sybil node detection schemes may be difficult, and low powered Internet of Things devices are usually unable to perform impactful amounts of work for proof-of-work based schemes. In this paper, we present Rechained, a scheme that monetarily disincentivizes the creation of Sybil identities for networks that can operate with intermittent or no Internet connectivity. We introduce a new revocation mechanism for identities, tie them into the concepts of self-sovereign identities and decentralized identifiers. Case-studies are used to discuss upper- and lower-bounds for the costs of Sybil identities and, therefore, the provided security level. Furthermore, we formalize the protocol using Colored Petri Nets to analyze its correctness and suitability. Proof-of-concept implementations are used to evaluate the performance of our scheme on low powered hardware as it might be found in Internet of Things applications.

Instructions: 

The main part of the data set is the file "20200623_Rechained--v08.xml", which contains a CPN model for the Rechained protocol. To use this file, it needs to be renamed to "20200623_Rechained--v08.cpn". This file can be used with "CPN Tools", an open source, GPL licenced tool for working with Colored Petri nets. CPN Tools is available on: http://cpntools.org/

 

The file "20200617_Protocol-Semantics.pdf" contains the protocol semantics, CPN token color sets, names and acronyms used.

 

The file "20200623_Rechained--v08--state-space-analysis.txt" contains the results of the state space analysis.

Dataset Files

LOGIN TO ACCESS DATASET FILES
Open Access dataset files are accessible to all logged in  users. Don't have a login?  Create a free IEEE account.  IEEE Membership is not required.

Documentation

AttachmentSize
File Protocol semantics57.31 KB