Detection and Prevention of Routing Attacks in Internet of Things

被引:15
作者
Choudhary, Sarika [1 ]
Kesswani, Nishtha [1 ]
机构
[1] Cent Univ Rajasthan, Dept Comp Sci, Ajmer, Rajasthan, India
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
Internet of Things; Intrusion Detection System (IDS); 6LoWPAN; RPL; Routing Attack; Selective Forwarding; Sinkhole; Security; INTRUSION DETECTION;
D O I
10.1109/TrustCom/BigDataSE.2018.00219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) is the smart network which connects smart objects over the Internet. The Internet is untrusted and unreliable network and thus IoT network is vulnerable to different kind of attacks. Conventional encryption and authentication techniques sometimes fail on IoT based network and intrusion may succeed to destroy the network. So, it is necessary to design intrusion detection system for such network. In our paper, we detect routing attacks such as sinkhole and selective forwarding. We have also tried to prevent our network from these attacks. We designed detection and prevention algorithm, i.e., KMA(Key Match Algorithm) and CBA(Cluster-Based Algorithm) in MatLab simulation environment. We gave two intrusion detection mechanisms and compared their results as well. True positive intrusion detection rate for our work is between 50% to 80% with KMA and 76% to 96% with CBA algorithm.
引用
收藏
页码:1537 / 1540
页数:4
相关论文
共 50 条
[21]   Routing Attack and Detection Methods in the RPL-based Internet of Things [J].
Wang, Xinlong ;
Yang, Wei ;
Hou, Chengqi ;
Luo, Hongtao .
2024 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2024, :127-130
[22]   DEEM: A Decentralized and Energy Efficient Method for detecting sinkhole attacks on the internet of things [J].
Taghanaki, Saeid Rafiei ;
Jamshidi, Kamal ;
Bohlooli, Ali .
2019 9TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2019), 2019, :325-330
[23]   An Impact Review on Internet of Things Attacks [J].
Gamundani, Attlee M. .
2015 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN NETWORKS AND COMPUTER COMMUNICATIONS (ETNCC), 2015, :114-118
[24]   A secure routing protocol based on RPL for Internet of Things [J].
Glissa, Ghada ;
Rachedi, Abderrezak ;
Meddeb, Aref .
2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
[25]   RIoT: A Routing Protocol for the Internet of Things [J].
Farooq, Muhammad Omer .
COMPUTER JOURNAL, 2020, 63 (06) :958-973
[26]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[27]   Applying Deep Reinforcement Learning for Detection of Internet-of-Things Cyber Attacks [J].
Rookard, Curtis ;
Khojandi, Anahita .
2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, :389-395
[28]   Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks [J].
Jiang, Yiming ;
Zhang, Jiangfan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :3445-3460
[29]   Investigations on Information Solicitation and Version Number Attacks in Internet of Things [J].
Verma, Vinod Kumar ;
Sharma, Saurabh .
IEEE SENSORS JOURNAL, 2023, 23 (03) :3204-3211
[30]   A Taxonomy of Machine-Learning-Based Intrusion Detection Systems for the Internet of Things: A Survey [J].
Jamalipour, Abbas ;
Murali, Sarumathi .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) :9444-9466