A context-aware information-based clone node attack detection scheme in Internet of Things

被引:11
|
作者
Hameed, Khizar [1 ]
Garg, Saurabh [1 ]
Amin, Muhammad Bilal [1 ]
Kang, Byeong [1 ]
Khan, Abid [2 ]
机构
[1] Univ Tasmania, Sch Technol Environm & Design, Discipline ICT, Hobart, Tas, Australia
[2] Teesside Univ, Sch Comp Engn & Digital Technol, Dept Comp Sci, Middlesbrough TS1 3BX, Tees Valley, England
关键词
Internet of Things; Clone node attack; Clone detection; Replica node detection; Context-aware information; Location proof; WIRELESS SENSOR NETWORKS; DISTRIBUTED DETECTION; REPLICATION ATTACKS; BATCH VERIFICATION; PROTOCOL; INTEGRATION; CHALLENGES; LIFETIME; FUTURE; ISSUES;
D O I
10.1016/j.jnca.2021.103271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts such as smart robotics. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousands of IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing and sharing information. Nonetheless, IoT devices are frequently deployed in hostile environments, wherein adversaries attempt to capture them in order to seize control of the entire network. One such example of potentially malicious behaviour is the cloning of IoT devices, in which an attacker can physically capture the devices, obtain some sensitive information, duplicate the devices, and intelligently deploy them in desired locations to conduct various insider attacks. A device cloning attack on IoT networks is a significant security concern since it allows for selective forwarding, sinkhole, black-hole, and warm-hole attacks. To address this issue, this paper provides an efficient scheme for detecting clone node attack on mobile IoT networks that uses semantic information of IoT devices known as context information to locate them securely. We design the location proof mechanism by combining location proofs and batch verification of the extended elliptic curve digital signature technique (ECDSA*) to accelerate the verification process at selected trusted nodes. Furthermore, we present a model for selecting trustworthy IoT devices based on their profile capabilities, enabling them to be chosen from the other IoT devices for the location proof-verification procedure. Compared with existing studies, the performance analysis and experimental results suggest that our proposed scheme provides a high degree of detection accuracy with minimal detection time and significantly reduces the computation, communication, energy and storage overheads.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] An Adaptive Semantic Annotation Tool for Teachers Based on Context-Aware and Internet of Things
    Bensattalah, Aissa
    Chalal, Rachid
    Nader, Fahima
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2023, 33 (09) : 1355 - 1385
  • [32] A Context-Aware Edge Computing Framework for Smart Internet of Things
    Ben Sada, Abdelkarim
    Naouri, Abdenacer
    Khelloufi, Amar
    Dhelim, Sahraoui
    Ning, Huansheng
    FUTURE INTERNET, 2023, 15 (05)
  • [33] Towards a Context-Aware Framework for Internet of Things and Smart Everything
    Bazan-Munoz, Adrian
    SERVICE-ORIENTED COMPUTING - ICSOC 2022 WORKSHOPS, 2023, 13821 : 308 - 313
  • [34] Context-Aware Trustworthy Service Evaluation in Social Internet of Things
    Khani, Maryam
    Wang, Yan
    Orgun, Mehmet A.
    Zhu, Feng
    SERVICE-ORIENTED COMPUTING (ICSOC 2018), 2018, 11236 : 129 - 145
  • [35] rIoT: Enabling Seamless Context-Aware Automation in the Internet of Things
    Hua, Jie
    Liu, Chenguang
    Kalbarczyk, Tomasz
    Wright, Catherine
    Roman, Gruia-Catalin
    Julien, Christine
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2019), 2019, : 227 - 235
  • [36] Context-Aware Fog Computing Implementation for Industrial Internet of Things
    Atieh, Adel
    Nanda, Priyadarsi
    Mohanty, Manoranjan
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 598 - 603
  • [37] Context-aware Addressing in the Internet of Things using Bloom Filters
    Kalmar, Andras
    Vida, Rolland
    Maliosz, Markosz
    2013 IEEE 4TH INTERNATIONAL CONFERENCE ON COGNITIVE INFOCOMMUNICATIONS (COGINFOCOM), 2013, : 487 - 492
  • [38] Internet based multimodal collaboration through context-aware information dissemination
    Kammanahalli, H
    Gopalan, S
    Sridhar, V
    Ramamritham, K
    PROCEEDINGS OF THE EIGHTH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2004, : 359 - 366
  • [39] Context-aware cognitive disaster management using fog-based Internet of Things
    Butt, Talal Ashraf
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)
  • [40] A Framework for Exploiting Internet of Things for Context-Aware Trust-Based Personalized Services
    Otebolaku, Abayomi
    Lee, Gyu Myoung
    MOBILE INFORMATION SYSTEMS, 2018, 2018