Blackhole Detection in 6LoWPAN Based Internet of Things : An Anomaly Based Approach

被引:0
|
作者
Patel, Himanshu B. [1 ]
Jinwala, Devesh C. [2 ]
机构
[1] SV Natl Inst Technol Surat, Comp Engn Dept, Surat, India
[2] Indian Inst Technol Jammu, Comp Sci & Engn Discipline, Jammu, India
关键词
Intrusion Detection; Blackhole; Internet of Things;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of things networks is vulnerable to many DOS attacks. Among them, Blackhole attack is one of the severe attacks as it hampers communication among network devices. In general, the solutions presented in the literature for Blackhole detection are not efficient. In addition, the existing approaches do not factor-in, the consumption in resources viz. energy, bandwidth and network lifetime. Further, these approaches are also insensitive to the mechanism used for selecting a parent in on Blackhole formation. Needless to say, a blackhole node if selected as parent would lead to orchestration of this attack trivially and hence it is an important factor in selection of a parent. In this paper, we propose SIEWE (Strainer based Intrusion Detection of Blackhole in 6LoWPAN for the Internet of Things) - an Intrusion detection mechanism to identify Blackhole attack on Routing protocol RPL in IoT. In contrast to the Watchdog based approaches where every node in network runs in promiscuous mode, SIEWE filters out suspicious nodes first and then verifies the behavior of those nodes only. The results that we obtain, show that SIEWE improves the Packet Delivery Ratio (PDR) of the system by blacklisting malicious Blackhole nodes.
引用
收藏
页码:947 / 954
页数:8
相关论文
共 50 条
  • [1] Denial-of-Service detection in 6LoWPAN based Internet of Things
    Kasinathan, Prabhakaran
    Pastrone, Claudio
    Spirito, Maurizio A.
    Vinkovits, Mark
    [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 600 - 607
  • [2] Distributed Monitoring in 6LoWPAN based Internet of Things
    Mostafa, B.
    Benslimane, A.
    Boureau, E.
    Molnar, M.
    Saleh, M.
    [J]. 2016 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE & WIRELESS NETWORKING (MOWNET), 2016, : 188 - 194
  • [3] Trust and Strainer Based Approach for Mitigating Blackhole Attack in 6LoWPAN: A Hybrid Approach
    Patel, Himanshu B.
    Jinwala, Devesh C.
    [J]. IAENG International Journal of Computer Science, 2021, 48 (04)
  • [4] Security of RPL Based 6LoWPAN Networks in the Internet of Things: A Review
    Verma, Abhishek
    Ranga, Virender
    [J]. IEEE SENSORS JOURNAL, 2020, 20 (11) : 5666 - 5690
  • [5] Comparison of 6LoWPAN and LPWAN for the Internet of Things
    [J]. Al-Kashoash, H.A.A. (hayderaam@stu.edu.iq), 1600, Taylor and Francis Ltd. (13):
  • [6] 6LoWPAN based Service Discovery and RESTful Web Accessibility for Internet of Things
    Mohiuddin, Jamal
    Bhadram, Varka
    Palli, Sowjanya
    Koshy, Santosh Sam
    [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 24 - 30
  • [7] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Abhishek Verma
    Virender Ranga
    [J]. Computing, 2021, 103 : 1479 - 1500
  • [8] The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things
    Verma, Abhishek
    Ranga, Virender
    [J]. COMPUTING, 2021, 103 (07) : 1479 - 1500
  • [9] InDReS: An Intrusion Detection and Response System for Internet of Things with 6LoWPAN
    Surendar, M.
    Umamakeswari, A.
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1903 - 1908
  • [10] IMBF - Counteracting Denial-of-Sleep Attacks in 6LowPAN Based Internet of Things
    Husain, A. Jahir
    Mohamed, M. A. Maluk
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (02) : 361 - 374