Mitigação de Ataques no Roteamento em IoT Densa e Móvel Baseada em Agrupamento e Confiabilidade dos Dispositivos

  • Christian Cervantes UFPR
  • Michele Nogueira UFPR
  • Aldri Santos UFPR

Abstract


One of the challenges to the deployment of Dense and mobile IoT consists of its vulnerability to various routing attacks due to a variable infrastructure, distinct computing resources, and being an open network with heterogeneous mobile objects. Sinkhole and selective forwarding stand out among the most destructive attacks for unstructured networks. Although current intrusion detection systems (IDS) are a good countermeasure for protecting networks and data dissemination systems against IOT attacks, they still have a number of cost and performance constraints. This paper proposes an intrusion detection system against sinkhole and selective forwarding attacks on routing in dense and mobile IoT. The system, called Thatachi, takes into account clustering to deal with the devices density and mobility, and combines watchdog, reputation and trust strategies for detecting attacker in order to ensure the device reliability. A Thatachi's evaluation using the Cooja simulator has showed its effectiveness in mitigating both attacks and its low resource consumption.

References

Accettura, N., Grieco, L. A., Boggia, G., and Camarda, P. (2011). Performance analysis of the rpl routing protocol. In Mechatronics (ICM), 2011 IEEE International Conference on, pages 767–772. IEEE.

Adat, V. and Gupta, B. (2017). Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommunication Systems, pages 1–19.

Airehrour, D., Gutierrez, J., Ray, S. K., et al. (2017). A trust-aware rpl routing protocol to detect blackhole and selective forwarding attacks. Australian Journal of Telecommunications and the Digital Economy, 5(1):50.

Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15):2787–2805.

Bari, N., Mani, G., and Berkovich, S. (2013). Internet of things as a methodological concept. In Fourth International Conference on Computing for Geospatial Research and Application (COM. Geo), 2013, pages 48–55. IEEE.

Borgia, E. (2014). The internet of things vision: key features, applications and open issues. Computer Networks, 54:1–31.

Cervantes, C., Poplade, D., Nogueira, M., and Santos, A. (2015). Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of In IFIP/IEEE International Symposium on Integrated Network Management things. (IM) 2015, pages 606–611. IEEE.

Dunkels, A., Gronvall, B., and Voigt, T. (2004). Contiki-a lightweight and exible operating system for tiny networked sensors. In 29th Annual IEEE International Conference on Local Computer Networks, 2004, pages 455–462. IEEE.

Hasan, M. M. and Mouftah, H. T. (2017). Optimization of watchdog selection in wireless sensor networks. IEEE Wireless Communications Letters, 6(1):94–97.

Kamble, A., Malemath, V. S., and Patil, D. (2017). Security attacks and secure routing protocols in rpl-based internet of things: Survey. In International Conference on Emerging Trends & Innovation in ICT (ICEI), 2017, pages 33–39. IEEE.

Khan, Z. A. and Herrmann, P. (2017). A trust based distributed In IEEE 31st Conference on intrusion detection mechanism for internet of things. Advanced Information Networking and Applications (AINA), 2017, pages 1169–1176.

Le, A., Loo, J., Chai, K. K., and Aiash, M. (2016). A specication-based ids for detecting attacks on rpl-based network topology. Information, 7(2):25.

Lima, M. N., Dos Santos, A. L., and Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 11(1):66–77.

Mathur, A., Newe, T., and Rao, M. (2016). Defence against black hole and selective forwarding attacks for medical wsns in the iot. Sensors, 16(1):118.

Sheikhan, M. and Bostani, H. (2017). A security mechanism for detecting intrusions in internet of things using selected features based on mi-bgsa. Int. Journal of Information & Communication Technology Research, 9(2):53–62.

Sicari, S., Rizzardi, A., Grieco, L. A., and Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76:146–164.

Sonar, S., Roy, D. B., Chakraborty, R. S., and Mukhopadhyay, D. (2016). Side-channel watchdog: Run-time evaluation of side-channel vulnerability in fpgabased crypto-systems. IACR Cryptology EPrint Archive, 2016:182.

Tang, H. (2015). A novel fuzzy soft set approach in decision making based on grey relational analysis and dempster–shafer theory of evidence. Applied Soft Computing, 31:317–325.

Thanigaivelan, N. K., Nigussie, E., Kanth, R. K., Virtanen, S., and Isoaho, J. (2016). Distributed internal anomaly detection system for internet-ofthings. In 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2016, pages 319–320. IEEE.

Yang, L., Ding, C., Wu, M., and Wang, K. (2017). Robust detection of false data injection attacks for the data aggregation in internet of things based environmental surveillance. Computer Networks.

Zarpelão, B. B., Miani, R. S., Kawakani, C. T., and de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications.
Published
2018-05-10
CERVANTES, Christian; NOGUEIRA, Michele; SANTOS, Aldri. Mitigação de Ataques no Roteamento em IoT Densa e Móvel Baseada em Agrupamento e Confiabilidade dos Dispositivos. In: BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 36. , 2018, Campos do Jordão. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2018 . p. 712-725. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc.2018.2453.

Most read articles by the same author(s)

<< < 1 2 3