Segurança em Internet das Coisas: Uma Análise de Comportamento de Rede sob Ataque

  • Alexandre M. Carrer USP
  • Cíntia B. Margi USP

Abstract


In order to provide detection and mitigation of Internet of Things (IoT) attacks, it is vital to understand how different attacks impact network performance. Literature, in general, includes network layer attacks analysis. In this work we implement attacks on the link layer (Blackhole and Greyhole) and transport layer (Flooding) and analyze the network behaviour using metrics such as server response rate to client requests and routing protocol downtime. Simulations were conducted with different densities of attackers and distances from the malicious node to the server. The results demonstrate the capacity of relating the collected metrics with the type of attack and approximate location of the attacking node.

References

Alexander, R., Brandt, A., Vasseur, J., Hui, J., Pister, K., Thubert, P., Levis, P., Struik, R., Kelsey, R., and Winter, T. (2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550.

Bansal, S. and Kumar, D. (2020). IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication. International Journal of Wireless Information Networks, 27.

Barthel, D., Vasseur, J., Pister, K., Kim, M., and Dejean, N. (2012). Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks. RFC 6551.

Contiki-NG (2022). Rpl — contiki-ng documentation. [link]. Acessado em: 11/jul/2023.

Contiki-NG (2023). Docker — contiki-ng documentation. [link]. Acessado em: 11/jul/2023.

Deogirikar, J. and Vidhate, A. (2017). Security attacks in iot: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pages 32–37.

Ganapathi, P. and D, S. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4.

Ioannou, C. and Vassiliou, V. (2016). The impact of network layer attacks in wireless sensor networks. In 2016 International Workshop on Secure Internet of Things (SIoT), pages 20–28.

Oikonomou, G., Duquennoy, S., Elsts, A., Eriksson, J., Tanaka, Y., and Tsiftes, N. (2022). The Contiki-NG open source operating system for next generation IoT devices. SoftwareX, 18:101089.

Palattella, M., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L., Boggia, G., and Dohler, M. (2013). Standardized protocol stack for the internet of (important) things. IEEE Communications Surveys ‘I&’ Tutorials, 15(3):1389–1406.

Rehman, A., Khan, M., Lodhi, M., and Hussain, F. (2016). Rank attack using objective function in rpl for low power and lossy networks. In 2016 International Conference on Industrial Informatics and Computer Systems (CIICS), pages 1–5.

Sarao, P. (2022). Performance analysis of manet under security attacks. J. Commun., 17(3):194–202.

Sidhu, N. and Sachdeva, M. (2020). Impact analysis of network layer attacks in real-time wireless sensor network testbed. International Journal of Advanced Computer Science and Applications, 11.

Tomić, I. and McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6):1910–1923.

Tripathi, M., Gaur, M., and Laxmi, V. (2013). Comparing the impact of black hole and gray hole attack on leach in wsn. Procedia Computer Science, 19:1101–1107. The 4th International Conference on Ambient Systems, Networks and Technologies (ANT 2013), the 3rd International Conference on Sustainable Energy Information Technology (SEIT-2013).

Zarpelão, B., Miani, R., Kawakani, C., and de Alvarenga, S. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications, 84:25–37.

Zhou, Y., Fang, Y., and Zhang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys ‘I&’ Tutorials, 10(3):6–28.

Zolertia (2013). Z1 zolertia. [link]. Acessado em: 11/jul/2023.
Published
2023-09-18
CARRER, Alexandre M.; MARGI, Cíntia B.. Segurança em Internet das Coisas: Uma Análise de Comportamento de Rede sob Ataque. In: WORKSHOP ON SCIENTIFIC INITIATION AND UNDERGRADUATE WORKS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 23. , 2023, Juiz de Fora/MG. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2023 . p. 189-200. DOI: https://doi.org/10.5753/sbseg_estendido.2023.235027.