Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

被引:7
|
作者
Zarei, Seyed Meysam [1 ]
Fotohi, Reza [2 ]
机构
[1] Islamic Azad Univ, Dept Comp, Isfahan Khorasgan Branch, Esfahan, Iran
[2] Shahid Beheshti Univ, Fac Comp Sci & Engn, GC Evin, Tehran 1983969411, Iran
关键词
average packet transmission; flooding attacks; internet of things (IoT); routing security; SECURITY; IOT; PROTOCOL; PRIVACY; TRUST;
D O I
10.1002/spy2.152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) ecosystem allows communication between billions of devices worldwide that are collecting data autonomously. The vast amount of data generated by these devices must be controlled totally securely. The centralized solutions are not capable of responding to these concerns due to security challenges problems. Thus, the Average Packet Transmission RREQ (APT-RREQ) as an effective solution, has been employed to overcome these concerns to allow for entirely secure communication between devices. In this paper, an approach called LSFA-IoT is proposed that protects the AODV routing protocol as well as the IoT network against flooding. The proposed method is divided into two main phases; the first phase includes a physical layer intrusion and attack detection system used to detect attacks, and the second phase involves detecting incorrect events through APT-RREQ messages. The simulation results indicated the superiority of the proposed method in terms of False Positive Rate (FPR), False Negative Rate (FPR), Detection Rate (DR), and Packet Delivery Rate (PDR) compared to REATO and IRAD. Also, the simulation results show how the proposed approach can significantly increase the security of each thing and network security.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Software defined network moving target defense mechanism against link flooding attacks
    Xie L.
    Ding Y.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2019, 59 (01): : 36 - 43
  • [42] Source-end Defense against SYN flooding attacks: An adaptive detection method
    Yu, Ming
    Chen, Weidong
    Zhou, Xiyuan
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1674 - 1677
  • [43] Utilizing NFV for Effective Moving Target Defense against Link Flooding Reconnaissance Attacks
    Aydeger, Abdullah
    Saputro, Nico
    Akkaya, Kemal
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 958 - 963
  • [44] Mitigating while Accessing: A Lightweight Defense Framework Against Link Flooding Attacks in SDN
    Sun, Hancun
    Chen, Xu
    Luo, Yantian
    Ge, Ning
    CHINA COMMUNICATIONS, 2024, 21 (11) : 15 - 27
  • [45] Probabilistic Approach of Coastal Defense Against Typhoon Attacks for Nuclear Power Plant
    Liu De-fu
    Han Feng-ting
    Pang Liang
    Li Hua-jun
    Xie Bo-tao
    Wang Feng-qing
    CHINA OCEAN ENGINEERING, 2010, 24 (02) : 265 - 275
  • [46] Probabilistic Approach of Coastal Defense Against Typhoon Attacks for Nuclear Power Plant
    刘德辅
    韩凤亭
    庞亮
    李华军
    谢波涛
    王风清
    China Ocean Engineering, 2010, 24 (02) : 265 - 275
  • [47] Detection of Attacks on Industrial Internet of Things Using Fewer Features
    Chuang, Hong-Yu
    Chen, Ruey-Maw
    Proceedings - 2023 6th International Symposium on Computer, Consumer and Control, IS3C 2023, 2023, : 1 - 4
  • [48] Traffic Fingerprinting Attacks on Internet of Things Using Machine Learning
    Skowron, Monika
    Janicki, Artur
    Mazurczyk, Wojciech
    IEEE ACCESS, 2020, 8 : 20386 - 20400
  • [49] Using honeypots to model botnet attacks on the internet of medical things
    Wang, Huanran
    He, Hui
    Zhang, Weizhe
    Liu, Wenmao
    Liu, Peng
    Javadpour, Amir
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [50] Internet of Things Cyber Attacks Detection using Machine Learning
    Alsamiri, Jadel
    Alsubhi, Khalid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 627 - 634