Detecting Sinkhole Attack in RPL-based Internet of Things Routing Protocol

Publish Year: 1400
نوع سند: مقاله ژورنالی
زبان: English
View: 332

This Paper With 14 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JADM-9-1_008

تاریخ نمایه سازی: 21 اردیبهشت 1400

Abstract:

The Internet of Things (IoT) is a novel paradigm in computer networks which is capable to connect things to the internet via a wide range of technologies. Due to the features of the sensors used in IoT networks and the unsecured nature of the internet, IoT is vulnerable to many internal routing attacks. Using traditional IDS in these networks has its own challenges due to the resource constraint of the nodes, and the characteristics of the IoT network. A sinkhole attacker node, in this network, attempts to attract traffic through incorrect information advertisement. In this research, a distributed IDS architecture is proposed to detect sinkhole routing attack in RPL-based IoT networks, which is aimed to improve true detection rate and reduce the false alarms. For the latter we used one type of post processing mechanism in which a threshold is defined for separating suspicious alarms for further verifications. Also, the implemented IDS modules distributed via client and router border nodes that makes it energy efficient. The required data for interpretation of network’s behavior gathered from scenarios implemented in Cooja environment with the aim of Rapidminer for mining the produces patterns. The produced dataset optimized using Genetic algorithm by selecting appropriate features. We investigate three different classification algorithms which in its best case Decision Tree could reaches to ۹۹.۳۵ rate of accuracy.

Authors

M. Yadollahzadeh Tabari

Department of Computer Engineering, Babol Branch, Islamic Azad University, Babol, Iran.

Z. Mataji

Department of Computer Engineering, Mazandaran Institute of Technology, Babol, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & ...
  • Airehrour, D., Gutierrez, J., & Ray, S. K. (2016). Secure ...
  • Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time ...
  • Bostani, H., & Sheikhan, M. (2017). Hybrid of anomaly-based and ...
  • Zhou H. (2013). The internet of things in the cloud: ...
  • Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., ...
  • Ahmadi Livani, M., Abadi, M., Alikhany, M., & Yadollahzadeh Tabari, ...
  • Pongle, P., & Chavan, G. (2015). Real Time Intrusion and ...
  • Le, A., Loo, J., Luo, Y., & Lasebae, A. (2011, ...
  • Anthea Mayzaud, Remi Badonnel, & Isabelle Chrisment. (2016). A Taxonomy ...
  • Le, A., Loo, J., Chai, K., & Aiash, M. (2016). ...
  • Wallgren, L., Raza, S., & Voigt, T. (2013). Routing Attacks ...
  • Krimmling, J., & Peter, S. (2014, October). Integration and evaluation ...
  • Van Poucke, S., Zhang, Z., Roest, M., Vukicevic, M., Beran, ...
  • Pham, B. T., Jaafari, A., Prakash, I., & Bui, D. ...
  • Mukherjee, A., Mondal, S., Chaki, N., & Khatua, S. (2018). ...
  • Kugler, P., Nordhus, P., & Eskofier, B. (2013, May). Shimmer, ...
  • Molisch, A. F., Balakrishnan, K., Chong, C. C., Emami, S., ...
  • نمایش کامل مراجع