A context-aware information-based clone node attack detection scheme in Internet of Things

被引:11
|
作者
Hameed, Khizar [1 ]
Garg, Saurabh [1 ]
Amin, Muhammad Bilal [1 ]
Kang, Byeong [1 ]
Khan, Abid [2 ]
机构
[1] Univ Tasmania, Sch Technol Environm & Design, Discipline ICT, Hobart, Tas, Australia
[2] Teesside Univ, Sch Comp Engn & Digital Technol, Dept Comp Sci, Middlesbrough TS1 3BX, Tees Valley, England
关键词
Internet of Things; Clone node attack; Clone detection; Replica node detection; Context-aware information; Location proof; WIRELESS SENSOR NETWORKS; DISTRIBUTED DETECTION; REPLICATION ATTACKS; BATCH VERIFICATION; PROTOCOL; INTEGRATION; CHALLENGES; LIFETIME; FUTURE; ISSUES;
D O I
10.1016/j.jnca.2021.103271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts such as smart robotics. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousands of IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing and sharing information. Nonetheless, IoT devices are frequently deployed in hostile environments, wherein adversaries attempt to capture them in order to seize control of the entire network. One such example of potentially malicious behaviour is the cloning of IoT devices, in which an attacker can physically capture the devices, obtain some sensitive information, duplicate the devices, and intelligently deploy them in desired locations to conduct various insider attacks. A device cloning attack on IoT networks is a significant security concern since it allows for selective forwarding, sinkhole, black-hole, and warm-hole attacks. To address this issue, this paper provides an efficient scheme for detecting clone node attack on mobile IoT networks that uses semantic information of IoT devices known as context information to locate them securely. We design the location proof mechanism by combining location proofs and batch verification of the extended elliptic curve digital signature technique (ECDSA*) to accelerate the verification process at selected trusted nodes. Furthermore, we present a model for selecting trustworthy IoT devices based on their profile capabilities, enabling them to be chosen from the other IoT devices for the location proof-verification procedure. Compared with existing studies, the performance analysis and experimental results suggest that our proposed scheme provides a high degree of detection accuracy with minimal detection time and significantly reduces the computation, communication, energy and storage overheads.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Semantics-based platform for context-aware and personalized robot interaction in the internet of robotic things
    Mahieu, Christof
    Ongenae, Femke
    De Backere, Femke
    Bonte, Pieter
    De Turck, Filip
    Simoens, Pieter
    JOURNAL OF SYSTEMS AND SOFTWARE, 2019, 149 : 138 - 157
  • [22] Life Navigator, Smart Internet of Things Based Context-Aware End-User Framework
    Yoo, Jae Pil
    Lee, Jae Il
    Kim, Cheonshik
    Park, Jonghyuk
    SENSOR LETTERS, 2013, 11 (09) : 1736 - 1740
  • [23] Context-aware Sensor Search, Selection and Ranking Model for Internet of Things Middleware
    Perera, Charith
    Zaslavsky, Arkady
    Christen, Peter
    Compton, Michael
    Georgakopoulos, Dimitrios
    2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 1, 2013, : 314 - 322
  • [24] A Survey of Context-Aware Messaging-Addressing for Sustainable Internet of Things (IoT)
    Almagrabi, Alaa Omran
    Al-Otaibi, Yasser D.
    SUSTAINABILITY, 2020, 12 (10)
  • [25] A Novel Detection and Localization Scheme for Wormhole Attack in Internet of Things
    Tong, Fei
    Chen, Cheng
    Pan, Jianping
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 7141 - 7152
  • [26] The Internet of Things Supporting Context-Aware Computing: A Cultural Heritage Case Study
    Francesco Piccialli
    Angelo Chianese
    Mobile Networks and Applications, 2017, 22 : 332 - 343
  • [27] A context-aware dispatcher for the Internet of Things: The case of electric power distribution systems
    Amin, Shaimaa A. A.
    Ali-Eldin, Amr
    Ali, Hesham Arafat
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 52 : 183 - 198
  • [28] An integrated semantic framework for designing context-aware Internet of Robotic Things systems
    Sabri, Lyazid
    Bouznad, Sofiane
    Fiorini, Sandro Rama
    Chibani, Abdelghani
    Prestes, Edson
    Amirat, Yacine
    INTEGRATED COMPUTER-AIDED ENGINEERING, 2018, 25 (02) : 137 - 156
  • [29] A Comparative Analysis of Scalable and Context-Aware Trust Management Approaches for Internet of Things
    Alshehri, Mohammad Dahman
    Hussain, Farookh Khadeer
    NEURAL INFORMATION PROCESSING, ICONIP 2015, PT IV, 2015, 9492 : 596 - 605
  • [30] Context-Aware Electronic Health Record-Internet of Things and Blockchain Approach
    Guimaraes, Tiago
    Duarte, Ricardo
    Hak, Francini
    Santos, Manuel
    INFORMATICS-BASEL, 2024, 11 (04):