An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)

被引:0
作者
Hussain, Muhammad Zunnurain [1 ]
Hanapi, Zurina Mohd [1 ]
Abdullah, Azizol [1 ]
Hussin, Masnida [1 ]
Ninggal, Mohd Izuan Hafez [2 ]
机构
[1] Univ Putra Malaysia UPM, Fac Comp Sci & Informat Technol, Dept Commun Technol, Serdang, Malaysia
[2] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Dept Comp Sci, Serdang, Malaysia
关键词
Security; Threats; IoT; Network; Sybil attack; IDS; Routing; SF-MRTS; Energy conservation; Digital landscape; LOW-POWER; INTERNET; IOT; PROTOCOL; THINGS;
D O I
10.7717/peerj-cs.2231
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. Using such a new way of calculating node reliability, we introduce a cutting-edge approach, evaluating parameters beyond routing metrics like energy conservation and actuality. SF-MRTS works precisely towards achieving a trusted network by introducing such trust metrics on secure paths. Therefore, this may be considered more likely to withstand the attacks because of these security improvements. The simulation function of SF-MRTS clearly shows its concordance with the security risk management features, which are also necessary for the network's performance and stability maintenance. These mechanisms are based on the principles of game theory, and they allocate attractions to the nodes that cooperate while imposing penalties on the nodes that do not. This will be the way to avoid damage to the network, and it will lead to collaboration between the nodes. SF-MRTS is a security technology for emerging industrial Internet of Things (IoT) network attacks. It effectively guaranteed reliability and improved the networks' resilience in different scenarios.
引用
收藏
页数:30
相关论文
共 34 条
  • [1] SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things
    Airehrour, David
    Gutierrez, Jairo A.
    Ray, Sayan Kumar
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 860 - 876
  • [2] Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
  • [3] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [4] Collaborative Learning Based Sybil Attack Detection in Vehicular AD-HOC Networks (VANETS)
    Azam, Sofia
    Bibi, Maryum
    Riaz, Rabia
    Rizvi, Sanam Shahla
    Kwon, Se Jin
    [J]. SENSORS, 2022, 22 (18)
  • [5] Radio Link Quality Estimation in Wireless Sensor Networks: A Survey
    Baccour, Nouha
    Koubaa, Anis
    Mottola, Luca
    Zuniga, Marco Antonio
    Youssef, Habib
    Boano, Carlo Alberto
    Alves, Mario
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2012, 8 (04)
  • [6] Bao F., 2012, P 2012 INT WORKSH SE, P1, DOI [DOI 10.1145/2378023.2378025, DOI 10.1109/WOWMOM.2012.6263792]
  • [7] Trust-Based Service Management for Mobile Cloud IoT Systems
    Chen, Ing-Ray
    Guo, Jia
    Wang, Ding-Chau
    Tsai, Jeffrey J. P.
    Al-Hamadi, Hamid
    You, Ilsun
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01): : 246 - 263
  • [8] Trust-Based Service Management for Social Internet of Things Systems
    Chen, Ing-Ray
    Bao, Fenye
    Guo, Jia
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (06) : 684 - 696
  • [9] De Couto DSJ, 2004, Ph.D. thesis
  • [10] Djedjig N, 2017, INT CONF INFORM COMM, P328, DOI 10.1109/IACS.2017.7921993