A context-aware information-based clone node attack detection scheme in Internet of Things

被引:11
|
作者
Hameed, Khizar [1 ]
Garg, Saurabh [1 ]
Amin, Muhammad Bilal [1 ]
Kang, Byeong [1 ]
Khan, Abid [2 ]
机构
[1] Univ Tasmania, Sch Technol Environm & Design, Discipline ICT, Hobart, Tas, Australia
[2] Teesside Univ, Sch Comp Engn & Digital Technol, Dept Comp Sci, Middlesbrough TS1 3BX, Tees Valley, England
关键词
Internet of Things; Clone node attack; Clone detection; Replica node detection; Context-aware information; Location proof; WIRELESS SENSOR NETWORKS; DISTRIBUTED DETECTION; REPLICATION ATTACKS; BATCH VERIFICATION; PROTOCOL; INTEGRATION; CHALLENGES; LIFETIME; FUTURE; ISSUES;
D O I
10.1016/j.jnca.2021.103271
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts such as smart robotics. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousands of IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing and sharing information. Nonetheless, IoT devices are frequently deployed in hostile environments, wherein adversaries attempt to capture them in order to seize control of the entire network. One such example of potentially malicious behaviour is the cloning of IoT devices, in which an attacker can physically capture the devices, obtain some sensitive information, duplicate the devices, and intelligently deploy them in desired locations to conduct various insider attacks. A device cloning attack on IoT networks is a significant security concern since it allows for selective forwarding, sinkhole, black-hole, and warm-hole attacks. To address this issue, this paper provides an efficient scheme for detecting clone node attack on mobile IoT networks that uses semantic information of IoT devices known as context information to locate them securely. We design the location proof mechanism by combining location proofs and batch verification of the extended elliptic curve digital signature technique (ECDSA*) to accelerate the verification process at selected trusted nodes. Furthermore, we present a model for selecting trustworthy IoT devices based on their profile capabilities, enabling them to be chosen from the other IoT devices for the location proof-verification procedure. Compared with existing studies, the performance analysis and experimental results suggest that our proposed scheme provides a high degree of detection accuracy with minimal detection time and significantly reduces the computation, communication, energy and storage overheads.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] A Sensing-as-a-Service Context-Aware System for Internet of Things Environments
    de Matos, Everton
    Amaral, Leonardo Albernaz
    Tiburski, Ramao Tiago
    Schenfeld, Matheus Crespi
    de Azevedo, Dario F. G.
    Hessel, Fabiano
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 724 - 727
  • [42] Context-aware Complex Event Processing for Event Cloud in Internet of Things
    Wang, Yongheng
    Cao, Kening
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2012), 2012,
  • [43] Study on Prediction Model of Context-Aware Services Technologies for Internet of Things
    Deng, Bo
    Ji, Jing
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 159 - +
  • [44] CARD: Context-Aware Resource Discovery for mobile Internet of Things scenarios
    Pozza, Riccardo
    Nati, Michele
    Georgoulas, Stylianos
    Gluhak, Alexander
    Moessner, Klaus
    Krco, Srdjan
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [45] Cluster Oriented Sensor Selection for Context-Aware Internet of Things Applications
    Nithya, K. K.
    Prathap, M. Vishnu
    Babu, K. R. Remesh
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 981 - 988
  • [46] A context-aware system in Internet of Things using modular Bayesian networks
    Yang, K.
    Cho, Sung-Bae
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (05):
  • [47] Context-Aware Computing, Learning, and Big Data in Internet of Things: A Survey
    Sezer, Omer Berat
    Dogdu, Erdogan
    Ozbayoglu, Ahmet Murat
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 1 - 27
  • [48] Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach
    Xia, Hui
    Xiao, Fu
    Zhang, San-shun
    Hu, Chun-qiang
    Cheng, Xiu-zhen
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 838 - 846
  • [49] A two-level authentication scheme for clone node detection in smart cities using Internet of things
    Shanmugam, Anitha
    Paramasivam, Jayanthi
    COMPUTATIONAL INTELLIGENCE, 2020, 36 (03) : 1200 - 1220
  • [50] Fog-Driven Context-Aware Architecture for Node Discovery and Energy Saving Strategy for Internet of Things Environments
    Venanzi, Riccardo
    Foschini, Luca
    Bellavista, Paolo
    Kantarci, Burak
    Stefanelli, Cesare
    IEEE ACCESS, 2019, 7 : 134173 - 134186