6MID:Mircochain based Intrusion Detection for 6LoWPAN based IoT networks

被引:3
|
作者
Patel, Himanshu B. [1 ]
Jinwala, Devesh C. [1 ]
机构
[1] SV Natl Inst Technol Surat, Comp Engn Dept, Gujrat 395007, India
来源
12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS | 2021年 / 184卷
关键词
IoT; RPL; Blockchain; Attack-mitigation; certificate-less cryptography; Blackhole; Intrusion detection; INTERNET; THINGS;
D O I
10.1016/j.procs.2021.04.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A blockchain is a decentralized, distributed, and often public, digital ledger system consisting of records called blocks, used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks. In literature, Blockchain is used as a medium to achieve trust between nodes in distributed autonomous systems like the Internet of Things(IoT). In IoT, resource-scarce, economical sensing devices are deployed in large to gain accuracy. Routing Protocol for Low Power and lossy network (RPL) is defined as the de facto standard for large-scale deployment. Due to wireless communication and resource constriend deployment, medium RPL is susceptible to many DOS attacks. This paper presents a space-efficient blockchain architecture viz. 6MID using Microchain. 6MID augments RPL to accommodate distributed ledger within resource-constrained 6LoWPAN devices and can be used to detect Blackhole attack. We also present a security analysis of the proposed framework in the context of IoT networks. (C) 2021 The Authors. Published by Elsevier B.V.
引用
收藏
页码:929 / 934
页数:6
相关论文
共 50 条
  • [31] Residual Energy based RE-RPL for 6LoWPAN
    Sarode, Ketki P.
    Solapure, Sharwari S.
    2019 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET 2019): ADVANCING WIRELESS AND MOBILE COMMUNICATIONS TECHNOLOGIES FOR 2020 INFORMATION SOCIETY, 2019, : 351 - 354
  • [32] Secure Group Mobility Support for 6LoWPAN Networks
    Qiu, Yue
    Ma, Maode
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02): : 1131 - 1141
  • [33] 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
    Le, Anhtuan
    Loo, Jonathan
    Lasebae, Aboubaker
    Aiash, Mahdi
    Luo, Yuan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (09) : 1189 - 1212
  • [34] An Intrusion Detection System for RPL-Based IoT Networks
    Ribera, Eric Garcia
    Alvarez, Brian Martinez
    Samuel, Charisma
    Ioulianou, Philokypros P.
    Vassilakis, Vassilios G.
    ELECTRONICS, 2022, 11 (23)
  • [35] A secure routing protocol for low power and lossy networks based 6LoWPAN networks to mitigate DIS flooding attacks
    Abhinaya, E. V.
    Sudhakar, B.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021,
  • [36] Lightweight XOR based FEC Algorithm for Fragment Forwarding in 6LoWPAN Networks
    Ji, Chenyang
    Bruniaux, Amaury
    Kotsiou, Vasileios
    Papadopoulos, Georgios Z.
    Chatzimisios, Periklis
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4806 - 4811
  • [37] Adversarial RL-Based IDS for Evolving Data Environment in 6LoWPAN
    Pasikhani, Aryan Mohammadi
    Clark, John A.
    Gope, Prosanta
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3831 - 3846
  • [38] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Abhishek Verma
    Virender Ranga
    Computing, 2021, 103 : 1479 - 1500
  • [39] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Verma, Abhishek
    Ranga, Virender
    COMPUTING, 2021, 103 (07) : 1479 - 1500
  • [40] Investigation of RPL in 6LoWPAN based elderly care monitoring system
    Parveen, M. Shabana
    Bhuvaneswari, P. T., V
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) : 5411 - 5426