Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach
Title | Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Patel, Himanshu B., Jinwala, Devesh C. |
Conference Name | TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON) |
Date Published | oct |
Publisher | IEEE |
ISBN Number | 978-1-7281-1895-6 |
Keywords | 6LoWPAN based Internet of Things, anomaly based approach, Blackhole, Blackhole attack, Blackhole detection, Blackhole formation, computer network reliability, computer network security, DoS attacks, Internet of Things, Intrusion detection, Intrusion detection mechanism, Linear programming, malicious blackhole nodes, Measurement, network devices, network lifetime, packet delivery ratio, personal area networks, promiscuous mode, pubcrawl, resilience, Resiliency, Routing, Routing Protocol, Routing protocols, RPL, Scalability, SIEWE, Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things, Watchdog based approaches |
Abstract | The Internet of things networks is vulnerable to many DOS attacks. Among them, Blackhole attack is one of the severe attacks as it hampers communication among network devices. In general, the solutions presented in the literature for Blackhole detection are not efficient. In addition, the existing approaches do not factor-in, the consumption in resources viz. energy, bandwidth and network lifetime. Further, these approaches are also insensitive to the mechanism used for selecting a parent in on Blackhole formation. Needless to say, a blackhole node if selected as parent would lead to orchestration of this attack trivially and hence it is an important factor in selection of a parent. In this paper, we propose SIEWE (Strainer based Intrusion Detection of Blackhole in 6LoWPAN for the Internet of Things) - an Intrusion detection mechanism to identify Blackhole attack on Routing protocol RPL in IoT. In contrast to the Watchdog based approaches where every node in network runs in promiscuous mode, SIEWE filters out suspicious nodes first and then verifies the behavior of those nodes only. The results that we obtain, show that SIEWE improves the Packet Delivery Ratio (PDR) of the system by blacklisting malicious Blackhole nodes. |
URL | https://ieeexplore.ieee.org/document/8929491 |
DOI | 10.1109/TENCON.2019.8929491 |
Citation Key | patel_blackhole_2019 |
- network devices
- Watchdog based approaches
- Strainer based intrusion detection of blackhole in 6LoWPAN for the Internet of Things
- SIEWE
- Scalability
- RPL
- Routing protocols
- Routing Protocol
- Routing
- Resiliency
- resilience
- pubcrawl
- promiscuous mode
- personal area networks
- packet delivery ratio
- network lifetime
- 6LoWPAN based Internet of Things
- Measurement
- malicious blackhole nodes
- Linear programming
- Intrusion detection mechanism
- Intrusion Detection
- Internet of Things
- DoS attacks
- computer network security
- computer network reliability
- Blackhole formation
- Blackhole detection
- Blackhole attack
- Blackhole
- anomaly based approach