SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL
Protocol-Based Node Rating and Ranking Mechanism
- URL: http://arxiv.org/abs/2005.09140v1
- Date: Sun, 17 May 2020 09:26:09 GMT
- Title: SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL
Protocol-Based Node Rating and Ranking Mechanism
- Authors: Mina Zaminkar and Reza Fotohi
- Abstract summary: IoTs are endowed with particular routing disobedience called sinkhole attack owing to their distributed features.
In these attacks, a malicious node broadcasts illusive information regarding the routings to impose itself as a route towards specific nodes for the neighboring nodes and thus, attract data traffic.
In this paper, the technique is assessed through wide simulations performed within the NS-3 environment. Based on the results of the simulation, it is indicated that the IoT network behavior metrics are enhanced based on the detection rate, false-negative rate, false-positive rate, packet delivery rate, maximum throughput, and packet loss rate.
- Score: 1.2691047660244335
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Through the Internet of Things (IoT) the internet scope is established by the
integration of physical things to classify themselves into mutual things. A
physical thing can be created by this inventive perception to signify itself in
the digital world. Regarding the physical things that are related to the
internet, it is worth noting that considering numerous theories and upcoming
predictions, they mostly require protected structures, moreover, they are at
risk of several attacks. IoTs are endowed with particular routing disobedience
called sinkhole attack owing to their distributed features. In these attacks, a
malicious node broadcasts illusive information regarding the routings to impose
itself as a route towards specific nodes for the neighboring nodes and thus,
attract data traffic. RPL (IP-V6 routing protocol for efficient and low-energy
networks) is a standard routing protocol which is mainly employed in sensor
networks and IoT. This protocol is called SoS-RPL consisting of two key
sections of the sinkhole detection. In the first section rating and ranking the
nodes in the RPL is carried out based on distance measurements. The second
section is in charge of discovering the misbehavior sources within the IoT
network through, the Average Packet Transmission RREQ (APT-RREQ). Here, the
technique is assessed through wide simulations performed within the NS-3
environment. Based on the results of the simulation, it is indicated that the
IoT network behavior metrics are enhanced based on the detection rate,
false-negative rate, false-positive rate, packet delivery rate, maximum
throughput, and packet loss rate.
Related papers
- A Lightweight Security Solution for Mitigation of Hatchetman Attack in RPL-based 6LoWPAN [0.24578723416255752]
The Internet of Things (IoT) has a significant rise in industries, and we live in the era of Industry 4.0.
The conventional routing method is ineffective in networks with limited resource devices, lossy links, and slow data rates.
This paper shows significant degradation in terms of network performance when an attacker exploits the Non-Storing feature of the Routing Protocol for Low Power and Lossy Networks (RPL)
arXiv Detail & Related papers (2024-04-02T06:48:33Z) - SISSA: Real-time Monitoring of Hardware Functional Safety and
Cybersecurity with In-vehicle SOME/IP Ethernet Traffic [49.549771439609046]
We propose SISSA, a SOME/IP communication traffic-based approach for modeling and analyzing in-vehicle functional safety and cyber security.
Specifically, SISSA models hardware failures with the Weibull distribution and addresses five potential attacks on SOME/IP communication.
Extensive experimental results show the effectiveness and efficiency of SISSA.
arXiv Detail & Related papers (2024-02-21T03:31:40Z) - MetaDetect: Metamorphic Testing Based Anomaly Detection for Multi-UAV
Wireless Networks [0.5076419064097734]
The reliability of wireless Ad Hoc Networks (WANET) communication is much lower than wired networks.
The proposed MT detection method is helpful for automatically identifying incidents/accident events on WANET.
arXiv Detail & Related papers (2023-12-07T23:24:58Z) - IoT Device Identification Based on Network Communication Analysis Using
Deep Learning [43.0717346071013]
The risk of attacks on an organization's network has increased due to the growing use of less secure IoT devices.
To tackle this threat and protect their networks, organizations generally implement security policies in which only white listed IoT devices are allowed on the network.
In this research, deep learning is applied to network communication for the automated identification of IoT devices permitted on the network.
arXiv Detail & Related papers (2023-03-02T13:44:58Z) - Bandwidth-efficient distributed neural network architectures with
application to body sensor networks [73.02174868813475]
This paper describes a conceptual design methodology to design distributed neural network architectures.
We show that the proposed framework enables up to a factor 20 in bandwidth reduction with minimal loss.
While the application focus of this paper is on wearable brain-computer interfaces, the proposed methodology can be applied in other sensor network-like applications as well.
arXiv Detail & Related papers (2022-10-14T12:35:32Z) - Deep Learning-Based Synchronization for Uplink NB-IoT [72.86843435313048]
We propose a neural network (NN)-based algorithm for device detection and time of arrival (ToA) estimation for the narrowband physical random-access channel (NPRACH) of narrowband internet of things (NB-IoT)
The introduced NN architecture leverages residual convolutional networks as well as knowledge of the preamble structure of the 5G New Radio (5G NR) specifications.
arXiv Detail & Related papers (2022-05-22T12:16:43Z) - Modelling DDoS Attacks in IoT Networks using Machine Learning [21.812642970826563]
TCP-specific attacks are one of the most plausible tools that attackers can use on Cyber-Physical Systems.
This study compares the effectiveness of supervised, unsupervised, and semi-supervised machine learning algorithms for detecting DDoS attacks in CPS-IoT.
arXiv Detail & Related papers (2021-12-10T12:09:26Z) - Packet-Loss-Tolerant Split Inference for Delay-Sensitive Deep Learning
in Lossy Wireless Networks [4.932130498861988]
In distributed inference, computational tasks are offloaded from the IoT device to other devices or the edge server via lossy IoT networks.
narrow-band and lossy IoT networks cause non-negligible packet losses and retransmissions, resulting in non-negligible communication latency.
We propose a split inference with no retransmissions (SI-NR) method that achieves high accuracy without any retransmissions, even when packet loss occurs.
arXiv Detail & Related papers (2021-04-28T08:28:22Z) - Genetic Improvement of Routing Protocols for Delay Tolerant Networks [3.9571744700171756]
We improve two routing protocols widely adopted in Delay Tolerant Networks (DTNs)
We dissect them into their fundamental components, i.e., checking if a node can transfer data, or sending messages to all connections.
We apply Genetic Improvement (GI) to manipulate these components as terminal nodes of evolving trees.
arXiv Detail & Related papers (2021-03-12T17:46:51Z) - Federated Learning over Wireless Device-to-Device Networks: Algorithms
and Convergence Analysis [46.76179091774633]
This paper studies federated learning (FL) over wireless device-to-device (D2D) networks.
First, we introduce generic digital and analog wireless implementations of communication-efficient DSGD algorithms.
Second, under the assumptions of convexity and connectivity, we provide convergence bounds for both implementations.
arXiv Detail & Related papers (2021-01-29T17:42:26Z) - Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT
Networks [96.24723959137218]
We study an edge intelligence-based IoT network in which a set of edge servers learn a shared model using federated learning (FL)
We propose a novel framework, called federated edge intelligence (FEI), that allows edge servers to evaluate the required number of data samples according to the energy cost of the IoT network.
We prove that our proposed algorithm does not cause any data leakage nor disclose any topological information of the IoT network.
arXiv Detail & Related papers (2020-11-25T12:51:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.