A context-aware information-based clone node attack detection scheme in Internet of Things

被引:11
|
作者
Hameed, Khizar [1 ]
Garg, Saurabh [1 ]
Amin, Muhammad Bilal [1 ]
Kang, Byeong [1 ]
Khan, Abid [2 ]
机构
[1] Univ Tasmania, Sch Technol Environm & Design, Discipline ICT, Hobart, Tas, Australia
[2] Teesside Univ, Sch Comp Engn & Digital Technol, Dept Comp Sci, Middlesbrough TS1 3BX, Tees Valley, England
关键词
Internet of Things; Clone node attack; Clone detection; Replica node detection; Context-aware information; Location proof; WIRELESS SENSOR NETWORKS; DISTRIBUTED DETECTION; REPLICATION ATTACKS; BATCH VERIFICATION; PROTOCOL; INTEGRATION; CHALLENGES; LIFETIME; FUTURE; ISSUES;
D O I
10.1016/j.jnca.2021.103271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts such as smart robotics. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousands of IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing and sharing information. Nonetheless, IoT devices are frequently deployed in hostile environments, wherein adversaries attempt to capture them in order to seize control of the entire network. One such example of potentially malicious behaviour is the cloning of IoT devices, in which an attacker can physically capture the devices, obtain some sensitive information, duplicate the devices, and intelligently deploy them in desired locations to conduct various insider attacks. A device cloning attack on IoT networks is a significant security concern since it allows for selective forwarding, sinkhole, black-hole, and warm-hole attacks. To address this issue, this paper provides an efficient scheme for detecting clone node attack on mobile IoT networks that uses semantic information of IoT devices known as context information to locate them securely. We design the location proof mechanism by combining location proofs and batch verification of the extended elliptic curve digital signature technique (ECDSA*) to accelerate the verification process at selected trusted nodes. Furthermore, we present a model for selecting trustworthy IoT devices based on their profile capabilities, enabling them to be chosen from the other IoT devices for the location proof-verification procedure. Compared with existing studies, the performance analysis and experimental results suggest that our proposed scheme provides a high degree of detection accuracy with minimal detection time and significantly reduces the computation, communication, energy and storage overheads.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Information Retrieval System Based on Context-aware in Internet of Things
    Ma Junhong
    Proceedings of the 2016 6th International Conference on Applied Science, Engineering and Technology (ICASET), 2016, 77 : 374 - 378
  • [2] Context-Aware Information-Based Access Restriction Scheme for Cloud Data
    Choi, Seul-Ki
    Kwak, Jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 89 - 96
  • [3] Towards a formal modelling, analysis and verification of a clone node attack detection scheme in the internet of things
    Hameed, Khizar
    Garg, Saurabh
    Amin, Muhammad Bilal
    Kang, Byeong
    COMPUTER NETWORKS, 2022, 204
  • [4] An industrial Internet of things based platform for context-aware information services in manufacturing
    Alexopoulos, Kosmas
    Sipsas, Konstantinos
    Xanthakis, Evangelos
    Makris, Sotiris
    Mourtzis, Dimitris
    INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 2018, 31 (11) : 1111 - 1123
  • [5] Towards Secure and Context-Aware Information Lookup for the Internet of Things
    Giannikos, Michalis
    Kokoli, Korina
    Fotiou, Nikos
    Marias, Giannis F.
    Polyzos, George C.
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2013,
  • [6] Context-Aware System for Information Services Provision in the Internet of Things
    de Matos, Everton
    Amaral, Leonardo A.
    Tiburski, Ramao
    Lunardi, Willian
    Hessel, Fabiano
    Marczak, Sabrina
    PROCEEDINGS OF 2015 IEEE 20TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2015,
  • [7] Context-aware Computing for the Internet of Things
    Piccialli, Francesco
    Jeon, Gwanggil
    INTERNET OF THINGS, 2021, 14
  • [8] Context-Aware Location in the Internet of Things
    Andreini, Federico
    Crisciani, Flavio
    Cicconetti, Claudio
    Mambrini, Raffaella
    2010 IEEE GLOBECOM WORKSHOPS, 2010, : 300 - 304
  • [9] Context-aware security in the internet of things: a survey
    Sylla, Tidiane
    Chalouf, Mohamed Aymen
    Krief, Francine
    Samake, Karim
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (03) : 231 - 262
  • [10] Internet of Things Context-Aware Privacy Architecture
    Rachid, Selt
    Challal, Yacine
    Nadjia, Benblidia
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,