A context-aware information-based clone node attack detection scheme in Internet of Things

被引:11
|
作者
Hameed, Khizar [1 ]
Garg, Saurabh [1 ]
Amin, Muhammad Bilal [1 ]
Kang, Byeong [1 ]
Khan, Abid [2 ]
机构
[1] Univ Tasmania, Sch Technol Environm & Design, Discipline ICT, Hobart, Tas, Australia
[2] Teesside Univ, Sch Comp Engn & Digital Technol, Dept Comp Sci, Middlesbrough TS1 3BX, Tees Valley, England
关键词
Internet of Things; Clone node attack; Clone detection; Replica node detection; Context-aware information; Location proof; WIRELESS SENSOR NETWORKS; DISTRIBUTED DETECTION; REPLICATION ATTACKS; BATCH VERIFICATION; PROTOCOL; INTEGRATION; CHALLENGES; LIFETIME; FUTURE; ISSUES;
D O I
10.1016/j.jnca.2021.103271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts such as smart robotics. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousands of IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing and sharing information. Nonetheless, IoT devices are frequently deployed in hostile environments, wherein adversaries attempt to capture them in order to seize control of the entire network. One such example of potentially malicious behaviour is the cloning of IoT devices, in which an attacker can physically capture the devices, obtain some sensitive information, duplicate the devices, and intelligently deploy them in desired locations to conduct various insider attacks. A device cloning attack on IoT networks is a significant security concern since it allows for selective forwarding, sinkhole, black-hole, and warm-hole attacks. To address this issue, this paper provides an efficient scheme for detecting clone node attack on mobile IoT networks that uses semantic information of IoT devices known as context information to locate them securely. We design the location proof mechanism by combining location proofs and batch verification of the extended elliptic curve digital signature technique (ECDSA*) to accelerate the verification process at selected trusted nodes. Furthermore, we present a model for selecting trustworthy IoT devices based on their profile capabilities, enabling them to be chosen from the other IoT devices for the location proof-verification procedure. Compared with existing studies, the performance analysis and experimental results suggest that our proposed scheme provides a high degree of detection accuracy with minimal detection time and significantly reduces the computation, communication, energy and storage overheads.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] Context-Aware Adaptive Authentication And Authorization in Internet of Things
    Arfaoui, Amel
    Cherkaoui, Soumaya
    Kribeche, Ali
    Senouci, Sidi Mohammed
    Hamdi, Mohamed
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [22] Context-Aware Security Using Internet of Things Devices
    Trnka, Michal
    Tomasek, Martin
    Cerny, Tomas
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 706 - 713
  • [23] Proposing Context-Aware Authentication for the Industrial Internet of Things
    Rothe, Lukas
    Loske, Moritz
    Gertler, Dominik G.
    2018 IEEE GLOBAL CONFERENCE ON INTERNET OF THINGS (GCIOT), 2018, : 84 - 88
  • [24] Semantic Reasoning for Context-Aware Internet of Things Applications
    A, Maarala, I
    Su, Xiang
    Riekki, Jukka
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 461 - 473
  • [25] Context-aware search optimization framework on the internet of things
    Bharti, Monika
    Kumar, Rajesh
    Saxena, Sharad
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (14):
  • [26] An approach of context-aware mobile applications for Internet of Things
    Gomez-Torres, Estevan
    Lujan-Mora, Sergio
    2017 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND COMPUTER SCIENCE (INCISCOS), 2017, : 41 - 48
  • [27] A Node Clone Attack Detection Scheme Based on Digital Watermark in WSNs
    Guan, Tonghui
    Chen, Yonghong
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 257 - 260
  • [28] A New Information Model Towards Context-aware Service Provisioning in the Internet-of-Things
    Aly, Mohab
    ElBarachi, May
    Dssouli, Rachida
    2015 8TH INTERNATIONAL CONFERENCE ON INTELLIGENCE IN NEXT GENERATION NETWORKS, 2015, : 160 - 167
  • [29] A Context-Aware Routing Protocol on Internet of Things Based on Sea Computing Model
    Chen, Zhikui
    Wang, Haozhe
    Liu, Yang
    Bu, Fanyu
    JOURNAL OF COMPUTERS, 2012, 7 (01) : 96 - 105
  • [30] Context-Aware Operation-Based Access Control for Internet of Things Applications
    Genc, Didem
    Tomur, Emrah
    Erten, Yusuf Murat
    2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,