6MID:Mircochain based Intrusion Detection for 6LoWPAN based IoT networks

被引:3
|
作者
Patel, Himanshu B. [1 ]
Jinwala, Devesh C. [1 ]
机构
[1] SV Natl Inst Technol Surat, Comp Engn Dept, Gujrat 395007, India
来源
12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS | 2021年 / 184卷
关键词
IoT; RPL; Blockchain; Attack-mitigation; certificate-less cryptography; Blackhole; Intrusion detection; INTERNET; THINGS;
D O I
10.1016/j.procs.2021.04.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A blockchain is a decentralized, distributed, and often public, digital ledger system consisting of records called blocks, used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks. In literature, Blockchain is used as a medium to achieve trust between nodes in distributed autonomous systems like the Internet of Things(IoT). In IoT, resource-scarce, economical sensing devices are deployed in large to gain accuracy. Routing Protocol for Low Power and lossy network (RPL) is defined as the de facto standard for large-scale deployment. Due to wireless communication and resource constriend deployment, medium RPL is susceptible to many DOS attacks. This paper presents a space-efficient blockchain architecture viz. 6MID using Microchain. 6MID augments RPL to accommodate distributed ledger within resource-constrained 6LoWPAN devices and can be used to detect Blackhole attack. We also present a security analysis of the proposed framework in the context of IoT networks. (C) 2021 The Authors. Published by Elsevier B.V.
引用
收藏
页码:929 / 934
页数:6
相关论文
共 50 条
  • [21] A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks
    Vinh Hoa La
    Cavalli, Ana R.
    2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016), 2016, : 49 - 54
  • [22] A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
    Bhale, Pradeepkumar
    Biswas, Santosh
    Nandi, Sukumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 915 - 934
  • [23] A Survey on 6LoWPAN Security for IoT: Taxonomy, Architecture, and Future Directions
    Thungon, Leki Chom
    Ahmed, Nurzaman
    De, Debashis
    Hussain, Md. Iftekhar
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (01) : 153 - 197
  • [24] Distributed Monitoring in 6LoWPAN based Internet of Things
    Mostafa, B.
    Benslimane, A.
    Boureau, E.
    Molnar, M.
    Saleh, M.
    2016 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE & WIRELESS NETWORKING (MOWNET), 2016, : 188 - 194
  • [25] A Mobility Solution for Hazardous Areas Based on 6LoWPAN
    Zamanifar, Azadeh
    Nazemi, Eslam
    Vahidi-Asl, Mojtaba
    MOBILE NETWORKS & APPLICATIONS, 2018, 23 (06): : 1539 - 1554
  • [27] A Survey : Attacks on RPL and 6LoWPAN in IoT
    Pongle, Pavan
    Chavan, Gurunath
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [28] A Study on Impact of DIS flooding Attack on RPL-based 6LowPAN Network
    Rajasekar, V. R.
    Rajkumar, S.
    MICROPROCESSORS AND MICROSYSTEMS, 2022, 94
  • [29] Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
    Verma, Abhishek
    Ranga, Virender
    IEEE SENSORS JOURNAL, 2020, 20 (11) : 5666 - 5690
  • [30] IPv6-Based Smart Grid Communication over 6LoWPAN
    Van Kerkhoven, Jason
    Charlebois, Nathaniel
    Robertson, Alex
    Gibson, Brydon
    Ahmed, Arslan
    Bouida, Zied
    Ibnkahla, Mohamed
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,