Book Details

An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment

IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

The Internet of Things (IoT) is an emerging technology in the world. Devices are increasing day by day. So, people are connected with internet. IoT is sensor based technology. IoT has the role of sensing, processing and delivering of information. But, Internet of things is facing lots of issues and challenges. Particularly, security is one of the big challenges in internet of things environment. This paper deals with the security issues based on routing attacks in network. Routing attacks are the most destructive issue. The paper proposes watchdog technique to detect sinkhole attack in internet of things environment. The technique uses the successful link as parameter.

References

[1] Wallgren Linus, Shahid Raza, and Thiemo Voigt, "Routing Attacks and Countermeasures in the RPL-based Internet of Things", International Journal of Distributed Sensor Networks, 2013.

[2] Sherasiya Tariqahmad, Hardik Upadhyay, and hiren b. patel, "A survey: Intrusion detection system for internet of things", International journal of computer science and engineering, Vol. 5, Issue 2, pp. 81-90, 2016.

[3] Farooq M. U., Muhammad Waseem, Anjum Khairi, and Sadia Mazhar, "A critical analysis on the security concerns of internet of things (IoT)", International Journal of Computer Applications, vol.111, no.7, 2015.

[4] Alanazi Shaker, Jalal Al-Muhtadi, Abdelouahid Derhab, Kashif Saleem, Afnan N. AlRomi, Hanan S. Alholaibah, Joel J.P.C Rodrigueset, "On resilience of Wireless Mesh routing protocol against DoS attacks in IoT-based ambient assisted living applications." E-health Networking, Application & Services (HealthCom), 2015 17th International Conference on. IEEE, 2015.

[5] Rghioui Anass, Mohammed Bouhorma, and Abderrahim Benslimane, "Analytical study of security aspects in 6LoWPAN networks", Information and Communication Technology for the Muslim World (ICT4M), 2013 5th International Conference on. IEEE, 2013.

[6] Bull Peter, Ron Austin, Evgenii Popov, Mak Sharma, and Richard Watson, "Flow Based Security for IoT Devices Using an SDN Gateway", Future Internet of Things and Cloud (FiCloud), 2016 IEEE 4th International Conference on. IEEE, 2016.

[7] Cervantes Christian, Diego Poplade, Michele Nogueira and Aldri Santos, "Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of things," Integrated Network Management IM), 2015 IFIP/IEEE International Symposium on. IEEE, 2015.

[8] Guerroumi Mohamed, Abdelouahid Derhab, and Kashif Saleem, "Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile Sink", Information Technology-New Generations (ITNG), 2015 12th International Conference on. IEEE, 2015.

[9] Mayzaud Anthéa, Rémi Badonnel, and Isabelle Chrisment, "A Taxonomy of Attacks in RPL-based Internet of Things", International Journal of Network Security, Vol. 18, Issue.3,pp. 459-473,2106.

[10] Jelodar Hamed, and Javad Aramideh, "Presenting a pattern for detection of denial of service attacks with web mining technique and fuzzy logic approach", Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on. IEEE, 2014.

[11] La Vinh Hoa, and Ana R. Cavalli, "A misbehavior node detection algorithm for 6LoWPAN Wireless Sensor Networks", Distributed Computing Systems Workshops (ICDCSW), 2016 IEEE 36th International Conference on. IEEE, 2016.

[12] Pongle Pavan, and Gurunath Chavan, "A survey: Attacks on RPL and 6LoWPAN in IoT", Pervasive Computing (ICPC), 2015 International Conference on. IEEE, 2015.

[13] Saghar Kashif, Mamoona Tariq, David Kendall,Ahmed Bouridane, "RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network", Applied Sciences and Technology (IBCAST), 2016 13th International Bhurban Conference on. IEEE, 2016.

[14] Granjal Jorge, Edmundo Monteiro, and Jorge Sá Silva, "Security for the internet of things: a survey of existing protocols and open research issues",IEEE Communications Surveys & Tutorials, Vol.17, No.3,pp.1294-1312, 2015.

[15] Surendar M., and A. Umamakeswari, "InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN", Wireless Communications, Signal Processing and Networking (WiSPNET), International Conference on. IEEE, 2016.

[17] Tsitsiroudi Niki,Panagiotis Sarigiannidis, Eirini Karapistoli, "EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs", Wireless and Mobile Networking Conference (WMNC), 2016 9th IFIP. IEEE, 2016.

[18] Rahman Saoreen,Shamim Al Mamun, Mahtab Uddin Ahmed, M. Shamim Kaiser, "PHY/MAC layer attack detection system using neuro-fuzzy algorithm for IoT network", Electrical, Electronics, and Optimization Techniques (ICEEOT), International Conference on. IEEE, 2016.

[19] Raza Shahid, Linus Wallgren, and Thiemo Voigt, "SVELTE: Real-time intrusion detection in the Internet of Things." Ad hoc networks, Vol.11, Issue.8, PP.2661-2674, 2013.

Keywords

IoT, Security, Routing, Sinkhole attack.

Image
  • Format Volume 5, Issue 1, No 16, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author R. Stephen, Dr. L.Arockiam
  • Reference IJCS-231
  • Page No 1439-1444

Copyright 2022 SK Research Group of Companies. All Rights Reserved.