Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

被引:7
|
作者
Zarei, Seyed Meysam [1 ]
Fotohi, Reza [2 ]
机构
[1] Islamic Azad Univ, Dept Comp, Isfahan Khorasgan Branch, Esfahan, Iran
[2] Shahid Beheshti Univ, Fac Comp Sci & Engn, GC Evin, Tehran 1983969411, Iran
关键词
average packet transmission; flooding attacks; internet of things (IoT); routing security; SECURITY; IOT; PROTOCOL; PRIVACY; TRUST;
D O I
10.1002/spy2.152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) ecosystem allows communication between billions of devices worldwide that are collecting data autonomously. The vast amount of data generated by these devices must be controlled totally securely. The centralized solutions are not capable of responding to these concerns due to security challenges problems. Thus, the Average Packet Transmission RREQ (APT-RREQ) as an effective solution, has been employed to overcome these concerns to allow for entirely secure communication between devices. In this paper, an approach called LSFA-IoT is proposed that protects the AODV routing protocol as well as the IoT network against flooding. The proposed method is divided into two main phases; the first phase includes a physical layer intrusion and attack detection system used to detect attacks, and the second phase involves detecting incorrect events through APT-RREQ messages. The simulation results indicated the superiority of the proposed method in terms of False Positive Rate (FPR), False Negative Rate (FPR), Detection Rate (DR), and Packet Delivery Rate (PDR) compared to REATO and IRAD. Also, the simulation results show how the proposed approach can significantly increase the security of each thing and network security.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Defending Against Link Flooding Attacks in Internet of Things: A Bayesian Game Approach
    Chen, Xu
    Feng, Wei
    Luo, Yantian
    Shen, Meng
    Ge, Ning
    Wang, Xianbin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01): : 117 - 128
  • [2] Joint application and network defense against DDoS flooding attacks in the future Internet
    Karrer, Roger P.
    Kuehn, Ulrich
    Huehn, Thomas
    FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 9 - +
  • [3] Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks
    Argyraki, Katerina
    Cheriton, David R.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (04) : 1284 - 1297
  • [4] LOT: A Defense Against IP Spoofing and Flooding Attacks
    Gilad, Yossi
    Herzberg, Amir
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (02)
  • [5] Centralized defense using smart routing against link-flooding Attacks
    Belabed, Dallal
    Bouet, Mathieu
    Conan, Vania
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [6] Defending against Flooding Attacks in the Internet of Drones Environment
    Pu, Cong
    Zhu, Pingping
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [7] A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks
    Jiang, Jun
    Liu, Yuhong
    Dezfouli, Behnam
    2018 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2018, : 1194 - 1199
  • [8] Precise Defense Approach Against Small-Scale Backdoor Attacks in Industrial Internet of Things
    Ran, Ziyong
    Yao, Yu
    Li, Wenxuan
    Yang, Wei
    Li, Weihao
    Wu, Yunfeng
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (05): : 5742 - 5754
  • [9] PDAAA: Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of Things
    Wang, Ling
    Zhang, Cheng
    Luo, Zejian
    Liu, Chenguang
    Liu, Jie
    Zheng, Xi
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 879 - 886
  • [10] Contiki-based mitigation of UDP flooding attacks in the Internet of things
    Kamaldeep
    Malik, Manisha
    Dutta, Maitreyee
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 1296 - 1300