Um Sistema de Detecção de Ataques Sinkhole sobre 6LoWPAN para Internet das Coisas

  • Christian Cervantes UFPR
  • Diego Poplade UFPR
  • Michele Nogueira UFPR
  • Aldri Santos UFPR

Abstract


The networks of Internet of Things (IoT) are formed by heterogeneous objects and these objects have in general very limited resources. Thus, IoT networks are vulnerable to various attacks, being the attack sinkhole one of the most destructive. However, existing solutions to provide protection and security against attacks sinkhole on IoT have high consumption of resources and employ complex mechanisms to ensure good performance. This paper proposes a system, called INTI (intrusion detection of sinkhole attacks on 6LoWPAN for IoT), to identify the presence of sinkhole attacks on the routing service of IoT. INTI aims to prevent, detect and isolate sinkhole attacks on routing within the IoT, while mitigating adverse effects. The system combines the use of watchdog, reputation and trust for detection of attackers, by analyzing the behavior of devices. Simulation results show the INTI performance and efficiency in terms of attack detection rate, number of false positives and false negatives.

References

Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. volume 54, páginas 2787–2805, Catania, Itália. Elservier Science Publishers B. V.

Bannack, A., da Silva, E., Lima, M. N., dos Santos, A. L., and Albini, L. C. P. (2008). Segurança em redes ad hoc. Anais do XXVI Simpósio Brasileiro de Telecomunicações (SBRT), páginas 19–20.

Bellavista, P., Cardone, G., Corradi, A., and Foschini, L. (2013). Convergence of MANET and WSN in IoT urban scenarios. volume 13, páginas 3558–3567. IEEE.

Dunkels, A., Gronvall, B., and Voigt, T. (2004). Contiki-a lightweight and flexible operating system for tiny networked sensors. páginas 455–462. IEEE.

Gaddour, O. and Koubâa, A. (2012). RPL in a nutshell: A survey. páginas 3163–3178. Elsevier.

Ganeriwal, S., Balzano, L. K., and Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(3):15.

Jin Qi, Tang Hong, K. X. L. Q. (2012). Detection and defence of sinkhole attack in wireless sensor network. In ICCT-2012, páginas 809–813, Chengdu, China. IEEE Security.

Kasinathan, P., Pastrone, C., Spirito, M. A., and Vinkovits, M. (2013). Denial-of-service detection in 6lowpan based internet of things. In WiMob-2013, páginas 600–607. IEEE.

Keally, M., Zhou, G., and Xing, G. (2010). Watchdog: Confident event detection in heterogeneous sensor networks. In RTAS-2010 16th IEEE, páginas 279–288. IEEE.

Korbi, I.E. Ben Brahim, M. A. C. S. L. (2012). Mobility enhanced RPL for wireless sensor networks. In NOF-2012, páginas 21–23. IEEE.

Lima, M., dos Santos, A. L., and Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. Communications Surveys & Tutorials, IEEE, 11(1):66–77.

Moon, S. Y. and Cho., T. H. (2009). Intrusion detection scheme against sinkhole attacks in directed diffusion based sensor networks. In IJCSNS, páginas 118–122, Coreia. IEEE Computer Society.

Perez-Toro, C. R., Panta, R. K., and Bagchi, S. (2010). Rdas: reputation-based resilient data aggregation in sensor network. In IEEE SECON-2010, páginas 1–9. IEEE.

Raza, S., Wallgren, L., and Voigt., T. (2013). Svelte: Real-time intrusion detection in the internet of things. páginas 2661 – 2674, USA. Elservier.

Sedjelmaci, H. and Feham, M. (2011). Novel hybrid intrusion detection system for clustered wireless sensor network. In International Journal of Network Security & Its Applications.

Shafiei, H., Khonsari, A., Derakhshi, H., and Mousavi, P. (2014). Detection and mitigation of sinkhole attacks in wireless sensor networks. volume 80, páginas 644–653. Elservier.

Sheela, D., K. C. N. and Mahadevan., G. (2011). A non cryptographic method of sinkhole attack detection in wireless sensor networks. In ICRTIT-2011, páginas 527–532, Tamil Nadu, Chennai. IEEE Security.

Wahab, O. A., Otrok, H., and Mourad, A. (2014). A cooperative watchdog model based on dempster–shafer for detecting misbehaving vehicles. Computer Communications, 41:43–54.

Wallgren, L., Raza, S., and Voigt, T. (2013). Routing attacks and countermeasures in the rpl-based internet of things. International Journal of Distributed Sensor Networks, 2013.
Published
2014-11-03
CERVANTES, Christian; POPLADE, Diego; NOGUEIRA, Michele; SANTOS, Aldri. Um Sistema de Detecção de Ataques Sinkhole sobre 6LoWPAN para Internet das Coisas. In: BRAZILIAN SYMPOSIUM ON INFORMATION AND COMPUTATIONAL SYSTEMS SECURITY (SBSEG), 14. , 2014, Belo Horizonte. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2014 . p. 153-166. DOI: https://doi.org/10.5753/sbseg.2014.20128.

Most read articles by the same author(s)

<< < 1 2 3