Detection and Prevention of Routing Attacks in Internet of Things
Title | Detection and Prevention of Routing Attacks in Internet of Things |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Choudhary, S., Kesswani, N. |
Conference Name | 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) |
ISBN Number | 978-1-5386-4388-4 |
Keywords | 6LoWPAN, authentication techniques, CBA algorithm, Cluster-Based Algorithm, Clustering algorithms, composability, cryptography, encryption techniques, Internet, Internet of Things, Intrusion detection, intrusion detection system, Intrusion Detection System (IDS), IoT based network, Key Match Algorithm, MatLab simulation, message authentication, Protocols, pubcrawl, Resiliency, Routing, Routing attack, routing attack detection, routing attack prevention, RPL, security, Selective Forwarding, Sinkhole, smart network, smart objects, Trusted Computing |
Abstract | Internet of things (IoT) is the smart network which connects smart objects over the Internet. The Internet is untrusted and unreliable network and thus IoT network is vulnerable to different kind of attacks. Conventional encryption and authentication techniques sometimes fail on IoT based network and intrusion may succeed to destroy the network. So, it is necessary to design intrusion detection system for such network. In our paper, we detect routing attacks such as sinkhole and selective forwarding. We have also tried to prevent our network from these attacks. We designed detection and prevention algorithm, i.e., KMA (Key Match Algorithm) and CBA (Cluster- Based Algorithm) in MatLab simulation environment. We gave two intrusion detection mechanisms and compared their results as well. True positive intrusion detection rate for our work is between 50% to 80% with KMA and 76% to 96% with CBA algorithm. |
URL | https://ieeexplore.ieee.org/document/8456088 |
DOI | 10.1109/TrustCom/BigDataSE.2018.00219 |
Citation Key | choudhary_detection_2018 |
- MatLab simulation
- Trusted Computing
- smart objects
- smart network
- Sinkhole
- Selective Forwarding
- security
- RPL
- routing attack prevention
- routing attack detection
- Routing attack
- Routing
- Resiliency
- pubcrawl
- Protocols
- message authentication
- 6LoWPAN
- Key Match Algorithm
- IoT based network
- Intrusion Detection System (IDS)
- intrusion detection system
- Intrusion Detection
- Internet of Things
- internet
- encryption techniques
- Cryptography
- composability
- Clustering algorithms
- Cluster-Based Algorithm
- CBA algorithm
- authentication techniques