Blackhole Detection in 6LoWPAN Based Internet of Things : An Anomaly Based Approach

被引:0
作者
Patel, Himanshu B. [1 ]
Jinwala, Devesh C. [2 ]
机构
[1] SV Natl Inst Technol Surat, Comp Engn Dept, Surat, India
[2] Indian Inst Technol Jammu, Comp Sci & Engn Discipline, Jammu, India
来源
PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY | 2019年
关键词
Intrusion Detection; Blackhole; Internet of Things;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of things networks is vulnerable to many DOS attacks. Among them, Blackhole attack is one of the severe attacks as it hampers communication among network devices. In general, the solutions presented in the literature for Blackhole detection are not efficient. In addition, the existing approaches do not factor-in, the consumption in resources viz. energy, bandwidth and network lifetime. Further, these approaches are also insensitive to the mechanism used for selecting a parent in on Blackhole formation. Needless to say, a blackhole node if selected as parent would lead to orchestration of this attack trivially and hence it is an important factor in selection of a parent. In this paper, we propose SIEWE (Strainer based Intrusion Detection of Blackhole in 6LoWPAN for the Internet of Things) - an Intrusion detection mechanism to identify Blackhole attack on Routing protocol RPL in IoT. In contrast to the Watchdog based approaches where every node in network runs in promiscuous mode, SIEWE filters out suspicious nodes first and then verifies the behavior of those nodes only. The results that we obtain, show that SIEWE improves the Packet Delivery Ratio (PDR) of the system by blacklisting malicious Blackhole nodes.
引用
收藏
页码:947 / 954
页数:8
相关论文
共 19 条
[1]   Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks [J].
Ahmed, Firoz ;
Ko, Young-Bae .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5143-5154
[2]  
Airehrour D, 2016, 2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), P115, DOI 10.1109/ATNAC.2016.7878793
[3]  
[Anonymous], 2015, TECH REP
[4]  
[Anonymous], 2012, 2012 20 IEEE INT C N
[5]  
[Anonymous], 2015, Proc. Intl. Conf. Pervasive Comput. (ICPC)
[6]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[7]   A high-throughput path metric for multi-hop wireless routing [J].
De Couto, DSJ ;
Aguayo, D ;
Bicket, J ;
Morris, R .
WIRELESS NETWORKS, 2005, 11 (04) :419-434
[8]  
Djedjig N, 2017, INT CONF INFORM COMM, P328, DOI 10.1109/IACS.2017.7921993
[9]  
Djedjig N, 2015, 2015 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), P962, DOI 10.1109/ISCC.2015.7405638
[10]  
Dunkels A, 2004, CONF LOCAL COMPUT NE, P455