Detection and Prevention of Routing Attacks in Internet of Things

被引:15
作者
Choudhary, Sarika [1 ]
Kesswani, Nishtha [1 ]
机构
[1] Cent Univ Rajasthan, Dept Comp Sci, Ajmer, Rajasthan, India
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
Internet of Things; Intrusion Detection System (IDS); 6LoWPAN; RPL; Routing Attack; Selective Forwarding; Sinkhole; Security; INTRUSION DETECTION;
D O I
10.1109/TrustCom/BigDataSE.2018.00219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) is the smart network which connects smart objects over the Internet. The Internet is untrusted and unreliable network and thus IoT network is vulnerable to different kind of attacks. Conventional encryption and authentication techniques sometimes fail on IoT based network and intrusion may succeed to destroy the network. So, it is necessary to design intrusion detection system for such network. In our paper, we detect routing attacks such as sinkhole and selective forwarding. We have also tried to prevent our network from these attacks. We designed detection and prevention algorithm, i.e., KMA(Key Match Algorithm) and CBA(Cluster-Based Algorithm) in MatLab simulation environment. We gave two intrusion detection mechanisms and compared their results as well. True positive intrusion detection rate for our work is between 50% to 80% with KMA and 76% to 96% with CBA algorithm.
引用
收藏
页码:1537 / 1540
页数:4
相关论文
共 50 条
  • [21] An Impact Review on Internet of Things Attacks
    Gamundani, Attlee M.
    2015 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN NETWORKS AND COMPUTER COMMUNICATIONS (ETNCC), 2015, : 114 - 118
  • [22] A secure routing protocol based on RPL for Internet of Things
    Glissa, Ghada
    Rachedi, Abderrezak
    Meddeb, Aref
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [23] Intrusion detection based on machine learning in the internet of things, attacks and counter measures
    Rehman, Eid
    Haseeb-ud-Din, Muhammad
    Malik, Arif Jamal
    Khan, Tehmina Karmat
    Abbasi, Aaqif Afzaal
    Kadry, Seifedine
    Khan, Muhammad Attique
    Rho, Seungmin
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (06) : 8890 - 8924
  • [24] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [25] RIoT: A Routing Protocol for the Internet of Things
    Farooq, Muhammad Omer
    COMPUTER JOURNAL, 2020, 63 (06) : 958 - 973
  • [26] Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks
    Jiang, Yiming
    Zhang, Jiangfan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3445 - 3460
  • [27] Applying Deep Reinforcement Learning for Detection of Internet-of-Things Cyber Attacks
    Rookard, Curtis
    Khojandi, Anahita
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 389 - 395
  • [28] A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey
    Jamalipour, Abbas
    Murali, Sarumathi
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9444 - 9466
  • [29] Investigations on Information Solicitation and Version Number Attacks in Internet of Things
    Verma, Vinod Kumar
    Sharma, Saurabh
    IEEE SENSORS JOURNAL, 2023, 23 (03) : 3204 - 3211
  • [30] RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment
    Wazid, Mohammad
    Dsouza, Poonam Reshma
    Das, Ashok Kumar
    Bhat, Vivekananda K.
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)