Securing communications between things against wormhole attacks using TOPSIS decision-making and hash-based cryptography techniques in the IoT ecosystem

被引:4
作者
Sahraneshin, Tayebeh [1 ]
Malekhosseini, Razieh [1 ]
Rad, Farhad [1 ]
Yaghoubyan, S. Hadi [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Yasooj Branch, Yasuj, Iran
关键词
Internet of Things (IoT); Securing communication; Wormhole attacks; Hash-based cryptography; TOPSIS decision-making; INTERNET;
D O I
10.1007/s11276-022-03169-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things, also called IoT for short, consists of billions of devices distributed around the world, all of which are connected through the Internet. Data is collected by things and shared with each other. Due to the nature and infrastructure of wireless IoT, they have several vulnerabilities. IoT security refers to the protection methods used to secure Internet-connected or network-based devices. In fact, the security of communication between things has become one of the open issues and challenges due to the existence of various types of attacks in IoT. One of these attacks that can disrupt the normal communication between things and destroy the network's efficiency is the wormhole attack. Thus, in this type of attack, two intruders are located in two different areas of the network and try to exchange confidential information quickly, as a result, they inform things about the fake route and things send the information to the destination from the same fake route. In fact, it is sent to the intruder's things, which leads to the deletion of data by these intruders. This attack alters the data stream and misleads the well. Therefore, to solve this problem, the proposed method of this paper (Sec-IoT) addresses two basic issues to secure communication between things against wormhole attacks in the Internet of Things. Thus, in the first phase of Sec-IoT, it examines the trust of all things in the route discovery process. The purpose of the first phase was to identify intruding nodes and remove them from the process of participating in network operations. And in the second phase, Cluster Head selection is done using TOPSIS algorithm and data transfer between things is done encrypted using Hash-based Cryptography. The goal of the second phase was to guarantee the integrity of the information sent. The simulation results showed that the proposed method is superior to HRCA and HBC methods in terms of throughput (25%, 18%), PDR (24%, 19%) and lost packet (19%, 15%).
引用
收藏
页码:969 / 983
页数:15
相关论文
共 30 条
[1]  
Acharjya DP, 2017, STUD BIG DATA, V25, P149, DOI 10.1007/978-3-319-53472-5_7
[2]   A Smart Collaborative Routing Protocol for Reliable Data Diffusion in IoT Scenarios [J].
Ai, Zheng-Yang ;
Zhou, Yu-Tong ;
Song, Fei .
SENSORS, 2018, 18 (06)
[3]   A novel mechanism to handle address spoofing attacks in SDN based IoT [J].
Aldabbas, Hamza ;
Amin, Rashid .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04) :3011-3026
[4]   Cryptosystem design based on Hermitian curves for IoT security [J].
Alzubi, Omar A. ;
Alzubi, Jafar A. ;
Dorgham, Osama ;
Alsayyed, Mohammad .
JOURNAL OF SUPERCOMPUTING, 2020, 76 (11) :8566-8589
[5]   Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems [J].
Ambili, K. N. ;
Jose, Jimmy .
INFORMATION SCIENCE AND APPLICATIONS, 2020, 621 :631-638
[6]   RFID Technology for IoT-Based Personal Healthcare in Smart Spaces [J].
Amendola, Sara ;
Lodato, Rossella ;
Manzari, Sabina ;
Occhiuzzi, Cecilia ;
Marrocco, Gaetano .
IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (02) :144-152
[7]  
Canedo Janice, 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST), P219, DOI 10.1109/PST.2016.7906930
[8]  
Deogirikar J, 2017, 2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), P32, DOI 10.1109/I-SMAC.2017.8058363
[9]   A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things [J].
Deshmukh-Bhosale, Snehal ;
Sonavane, Santosh S. .
12TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING (INTER-ENG 2018), 2019, 32 :840-847
[10]   Distributed attack detection scheme using deep learning approach for Internet of Things [J].
Diro, Abebe Abeshu ;
Chilamkurti, Naveen .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 :761-768