Skip to main content
Top
Published in: Wireless Personal Communications 4/2021

30-03-2021

A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema

Authors: Reza Fotohi, Hossein Pakdel

Published in: Wireless Personal Communications | Issue 4/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things, also known as the IoT, refers to the billions of devices around the world that are now connected to the Internet, collecting and sharing data. The amount of data collected through IoT sensors must be completely securely controlled. To protect the information collected by IoT sensors, a lightweight method called discover the flooding attack-RPL (DFA-RPL) has been proposed. The proposed DFA-RPL method identifies intrusive nodes in several steps to exclude them from continuing routing operations. Thus, in the DFA-RPL method, it first builds a cluster and selects the most appropriate node as a cluster head in DODAG, then, due to the vulnerability of the RPL protocol to Flooding attacks, it uses an ant colony algorithm using five steps to detect attacks. Use Flooding to prevent malicious activity on the IoT network. In other words, if it detects a node as malicious, it puts that node on the detention list and quarantines it for a certain period of time. The results obtained from the simulation show the superiority of the proposed method in terms of Packet Delivery Rate, Detection Rate, False Positive Rate, and False Negative Rate compared to IRAD and REATO methods.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hassan, W. H. (2019). Current research on internet of things (IoT) security: A survey. Computer networks, 148, 283–294.CrossRef Hassan, W. H. (2019). Current research on internet of things (IoT) security: A survey. Computer networks, 148, 283–294.CrossRef
2.
go back to reference Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395–411.CrossRef
3.
go back to reference Waraga, O. A., Bettayeb, M., Nasir, Q., & Talib, M. A. (2020). Design and implementation of automated IoT security testbed. Computers & Security, 88, 101648.CrossRef Waraga, O. A., Bettayeb, M., Nasir, Q., & Talib, M. A. (2020). Design and implementation of automated IoT security testbed. Computers & Security, 88, 101648.CrossRef
4.
go back to reference Mohanty, S. N., Ramya, K. C., Rani, S. S., Gupta, D., Shankar, K., Lakshmanaprabu, S. K., & Khanna, A. (2020). An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems, 102, 1027–1037.CrossRef Mohanty, S. N., Ramya, K. C., Rani, S. S., Gupta, D., Shankar, K., Lakshmanaprabu, S. K., & Khanna, A. (2020). An efficient Lightweight integrated Blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems, 102, 1027–1037.CrossRef
5.
go back to reference Mohanta, B. K., Jena, D., Satapathy, U., & Patnaik, S. (2020). Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things, 11, 100227. Mohanta, B. K., Jena, D., Satapathy, U., & Patnaik, S. (2020). Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology. Internet of Things, 11, 100227.
6.
go back to reference Mukherjee, B., Wang, S., Lu, W., Neupane, R. L., Dunn, D., Ren, Y., & Calyam, P. (2018). Flexible IoT security middleware for end-to-end cloud–fog communication. Future Generation Computer Systems, 87, 688–703.CrossRef Mukherjee, B., Wang, S., Lu, W., Neupane, R. L., Dunn, D., Ren, Y., & Calyam, P. (2018). Flexible IoT security middleware for end-to-end cloud–fog communication. Future Generation Computer Systems, 87, 688–703.CrossRef
7.
go back to reference Zaminkar, M., Sarkohaki, F., & Fotohi, R. (2021). A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem. International Journal of Communication Systems, 34(3), e4693.CrossRef Zaminkar, M., Sarkohaki, F., & Fotohi, R. (2021). A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem. International Journal of Communication Systems, 34(3), e4693.CrossRef
8.
go back to reference Zaminkar, M., & Fotohi, R. (2020). SoS-RPL: Securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wireless Personal Communications, 114, 1287–1312.CrossRef Zaminkar, M., & Fotohi, R. (2020). SoS-RPL: Securing internet of things against sinkhole attack using RPL protocol-based node rating and ranking mechanism. Wireless Personal Communications, 114, 1287–1312.CrossRef
9.
go back to reference Zakaria, H., Bakar, N. A. A., Hassan, N. H., & Yaacob, S. (2019). IoT security risk management model for secured practice in healthcare environment. Procedia Computer Science, 161, 1241–1248.CrossRef Zakaria, H., Bakar, N. A. A., Hassan, N. H., & Yaacob, S. (2019). IoT security risk management model for secured practice in healthcare environment. Procedia Computer Science, 161, 1241–1248.CrossRef
10.
go back to reference Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2017). SCOTRES: Secure routing for IoT and CPS. IEEE Internet of Things Journal, 4(6), 2129–2141.CrossRef Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2017). SCOTRES: Secure routing for IoT and CPS. IEEE Internet of Things Journal, 4(6), 2129–2141.CrossRef
11.
go back to reference Jiang, J., Chaczko, Z., Al-Doghman, F., & Narantaka, W. (2017). New LQR protocols with intrusion detection schemes for IOT security. In 2017 25th International Conference on Systems Engineering (ICSEng) (pp. 466–474). IEEE. Jiang, J., Chaczko, Z., Al-Doghman, F., & Narantaka, W. (2017). New LQR protocols with intrusion detection schemes for IOT security. In 2017 25th International Conference on Systems Engineering (ICSEng) (pp. 466–474). IEEE.
12.
go back to reference Lahbib, A., Toumi, K., Elleuch, S., Laouiti, A., & Martin, S. (2017). Link reliable and trust aware RPL routing protocol for Internet of Things. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) (pp. 1–5). IEEE. Lahbib, A., Toumi, K., Elleuch, S., Laouiti, A., & Martin, S. (2017). Link reliable and trust aware RPL routing protocol for Internet of Things. In 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA) (pp. 1–5). IEEE.
13.
go back to reference Devi, M. D., Geetha, K., & Saranyadevi, K. (2017). Content based routing using information centric network for IoT. Procedia computer science, 115, 707–714.CrossRef Devi, M. D., Geetha, K., & Saranyadevi, K. (2017). Content based routing using information centric network for IoT. Procedia computer science, 115, 707–714.CrossRef
14.
go back to reference Gawade, A. U., & Shekokar, N. M. (2017). Lightweight secure RPL: A need in IoT. In 2017 International Conference on Information Technology (ICIT) (pp. 214–219). IEEE. Gawade, A. U., & Shekokar, N. M. (2017). Lightweight secure RPL: A need in IoT. In 2017 International Conference on Information Technology (ICIT) (pp. 214–219). IEEE.
15.
go back to reference Hatzivasilis, G., Papaefstathiou, I., Fysarakis, K., & Askoxylakis, I. (2017). SecRoute: End-to-end secure communications for wireless ad-hoc networks. In 2017 IEEE Symposium on Computers and Communications (ISCC) (pp. 558–563). IEEE. Hatzivasilis, G., Papaefstathiou, I., Fysarakis, K., & Askoxylakis, I. (2017). SecRoute: End-to-end secure communications for wireless ad-hoc networks. In 2017 IEEE Symposium on Computers and Communications (ISCC) (pp. 558–563). IEEE.
16.
go back to reference Glissa, G., Rachedi, A., & Meddeb, A. (2016). A secure routing protocol based on RPL for Internet of Things. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–7). IEEE. Glissa, G., Rachedi, A., & Meddeb, A. (2016). A secure routing protocol based on RPL for Internet of Things. In 2016 IEEE Global Communications Conference (GLOBECOM) (pp. 1–7). IEEE.
17.
go back to reference Xia, Y., Lin, H., & Xu, L. (2015). An AGV mechanism based secure routing protocol for Internet of Things. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (pp. 662–666). IEEE. Xia, Y., Lin, H., & Xu, L. (2015). An AGV mechanism based secure routing protocol for Internet of Things. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (pp. 662–666). IEEE.
18.
go back to reference Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2017). New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS) (pp. 328–335). IEEE. Djedjig, N., Tandjaoui, D., Medjek, F., & Romdhani, I. (2017). New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS) (pp. 328–335). IEEE.
19.
go back to reference Yavuz, F. Y., Devrim, Ü. N. A. L., & Ensar, G. Ü. L. (2018). Deep learning for detection of routing attacks in the internet of things. International Journal of Computational Intelligence Systems, 12(1), 39–58.CrossRef Yavuz, F. Y., Devrim, Ü. N. A. L., & Ensar, G. Ü. L. (2018). Deep learning for detection of routing attacks in the internet of things. International Journal of Computational Intelligence Systems, 12(1), 39–58.CrossRef
20.
go back to reference Sicari, S., Rizzardi, A., Miorandi, D., & Coen-Porisini, A. (2018). REATO: REActing TO Denial of Service attacks in the Internet of Things. Computer Networks, 137, 37–48.CrossRef Sicari, S., Rizzardi, A., Miorandi, D., & Coen-Porisini, A. (2018). REATO: REActing TO Denial of Service attacks in the Internet of Things. Computer Networks, 137, 37–48.CrossRef
21.
go back to reference Mabodi, K., Yusei, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76(9), 7081–7106.CrossRef Mabodi, K., Yusei, M., Zandiyan, S., Irankhah, L., & Fotohi, R. (2020). Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. The Journal of Supercomputing, 76(9), 7081–7106.CrossRef
22.
go back to reference Fotohi, R., Firoozi Bari, S., & Yusefi, M. (2020). Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. International Journal of Communication Systems, 33(4), e4234.CrossRef Fotohi, R., Firoozi Bari, S., & Yusefi, M. (2020). Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. International Journal of Communication Systems, 33(4), e4234.CrossRef
23.
go back to reference Jamali, S., & Fotohi, R. (2017). DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. The Journal of Supercomputing, 73(12), 5173–5196.CrossRef Jamali, S., & Fotohi, R. (2017). DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. The Journal of Supercomputing, 73(12), 5173–5196.CrossRef
Metadata
Title
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema
Authors
Reza Fotohi
Hossein Pakdel
Publication date
30-03-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08388-1

Other articles of this Issue 4/2021

Wireless Personal Communications 4/2021 Go to the issue