Detection and Prevention of Routing Attacks in Internet of Things

被引:15
作者
Choudhary, Sarika [1 ]
Kesswani, Nishtha [1 ]
机构
[1] Cent Univ Rajasthan, Dept Comp Sci, Ajmer, Rajasthan, India
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
Internet of Things; Intrusion Detection System (IDS); 6LoWPAN; RPL; Routing Attack; Selective Forwarding; Sinkhole; Security; INTRUSION DETECTION;
D O I
10.1109/TrustCom/BigDataSE.2018.00219
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoT) is the smart network which connects smart objects over the Internet. The Internet is untrusted and unreliable network and thus IoT network is vulnerable to different kind of attacks. Conventional encryption and authentication techniques sometimes fail on IoT based network and intrusion may succeed to destroy the network. So, it is necessary to design intrusion detection system for such network. In our paper, we detect routing attacks such as sinkhole and selective forwarding. We have also tried to prevent our network from these attacks. We designed detection and prevention algorithm, i.e., KMA(Key Match Algorithm) and CBA(Cluster-Based Algorithm) in MatLab simulation environment. We gave two intrusion detection mechanisms and compared their results as well. True positive intrusion detection rate for our work is between 50% to 80% with KMA and 76% to 96% with CBA algorithm.
引用
收藏
页码:1537 / 1540
页数:4
相关论文
共 50 条
[41]   Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things [J].
Li, Xinghua ;
Xu, Mengfan ;
Vijayakumar, Pandi ;
Kumar, Neeraj ;
Liu, Ximeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) :8820-8831
[42]   Application of Synthetic Data Generation Methods to the Detection of Network Attacks on Internet of Things Devices [J].
Ovasapyan, T. D. ;
Danilov, V. D. ;
Moskvin, D. A. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) :991-998
[43]   A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things [J].
Khanam, Shapla ;
Ahmedy, Ismail Bin ;
Idna Idris, Mohd Yamani ;
Jaward, Mohamed Hisham ;
Bin Md Sabri, Aznul Qalid .
IEEE ACCESS, 2020, 8 :219709-219743
[44]   A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things [J].
Muzammal, Syeda Mariam ;
Murugesan, Raja Kumar ;
Jhanjhi, Noor Zaman ;
Humayun, Mamoona ;
Ibrahim, Ashraf Osman ;
Abdelmaboud, Abdelzahir .
SENSORS, 2022, 22 (18)
[45]   AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things [J].
Saurabh Sharma ;
Vinod Kumar Verma .
The Journal of Supercomputing, 2021, 77 :13757-13787
[46]   A Comprehensive Review on Secure Routing in Internet of Things: Mitigation Methods and Trust-Based Approaches [J].
Muzammal, Syeda M. ;
Murugesan, Raja Kumar ;
Jhanjhi, N. Z. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4186-4210
[47]   A lightweight distributed detection algorithm for DDAO attack on RPL routing protocol in Internet of Things [J].
Sheibani, Mohsen ;
Barekatain, Behrang ;
Arvan, Erfan .
PERVASIVE AND MOBILE COMPUTING, 2022, 80
[48]   Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks [J].
Lyu, Chen ;
Zhang, Xiaomei ;
Liu, Zhiqiang ;
Chi, Chi-Hung .
IEEE ACCESS, 2019, 7 :31068-31082
[49]   On Lightweight Method for Intrusions Detection in the Internet of Things [J].
Shakhov, Vladimir ;
Jan, Sana Ullah ;
Ahmed, Saeed ;
Koo, Insoo .
2019 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2019,
[50]   Anomaly Detection and Monitoring in Internet of Things Communication [J].
Stiawan, Deris ;
Idris, Mohd. Yazid ;
Malik, Reza Firsandaya ;
Nurmaini, Siti ;
Budiarto, Rahmat .
PROCEEDINGS OF 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING (ICITEE), 2016,