Skip to main content
Top
Published in: The Journal of Supercomputing 9/2020

08-01-2020

NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things

Authors: Behnam Seyedi, Reza Fotohi

Published in: The Journal of Supercomputing | Issue 9/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoTs) is a new concept in computer science that connects the objects with limited resources to unreliable internet through different technologies. The fundamental components of IoT (e.g., the wireless sensor networks and the internet) have an unsecured foundation that leads to different vulnerabilities such as vulnerability against a blackhole attack. In a blackhole attack, the attacker fakes itself as the shortest path to the destination, which is a node here. This causes the routing packets to not reach the destination. In this study, we offer a novel intelligent agent-based strategy using the hello packet table (NIASHPT) to deal with these problems by discovering the blackhole attacks. The proposed NIASHPT method provides an intrusion detection system scheme to defend against blackhole attacks and reduce or eliminate such attacks. This method consists of three phases: In the first phase, each node listens to its adjacent nodes and then applies a pre-routing process. In the stages of adjacent node listening and pre-routing, we attempt to find the blackhole attacks. In the second phase of the proposed method, the malicious nodes are detected and separated from the IoT network to avoid emerging attacks along the route from the source to the destination. In the third phase, the selected route from the source to the destination is checked. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the NIASHPT method can achieve a false positive rate of 19.453%, a false negative rate of 22.19%, a detection rate of 80.5%, a PDR of 89.56%, and a packet loss rate of 10.04% in the case of launching a blackhole attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bhalaji N, Hariharasudan KS, Aashika K (2019) A trust based mechanism to combat blackhole attack in RPL protocol. In: International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore, pp 457–464 Bhalaji N, Hariharasudan KS, Aashika K (2019) A trust based mechanism to combat blackhole attack in RPL protocol. In: International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore, pp 457–464
2.
go back to reference Hammamouche A, Omar M, Djebari N, Tari A (2018) Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J Inf Secur Appl 43:12–20 Hammamouche A, Omar M, Djebari N, Tari A (2018) Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J Inf Secur Appl 43:12–20
3.
go back to reference Behzad S, Fotohi R, Dadgar F (2015) Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. Int J Comput Sci Netw Solut IJCSNS 3:89–103 Behzad S, Fotohi R, Dadgar F (2015) Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. Int J Comput Sci Netw Solut IJCSNS 3:89–103
4.
go back to reference Fotohi R (2019) Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system. Reliab Eng Syst Saf 193:106675CrossRef Fotohi R (2019) Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system. Reliab Eng Syst Saf 193:106675CrossRef
5.
go back to reference Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71CrossRef Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71CrossRef
6.
go back to reference Sahay R, Geethakumari G, Mitra B, Thejas V (2018) Exponential smoothing based approach for detection of blackhole attacks in IoT. In: 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6 Sahay R, Geethakumari G, Mitra B, Thejas V (2018) Exponential smoothing based approach for detection of blackhole attacks in IoT. In: 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6
7.
go back to reference Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J 4(6):2129–2141CrossRef Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J 4(6):2129–2141CrossRef
9.
go back to reference Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun Surv Tutor 21(2):1582–1606CrossRef Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun Surv Tutor 21(2):1582–1606CrossRef
10.
go back to reference Patel HB, Jinwala DC (2019) Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE, pp 947–954 Patel HB, Jinwala DC (2019) Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE, pp 947–954
11.
go back to reference Conti M, Kaliyar P, Rabbani MM, Ranise S (2018) SPLIT: a secure and scalable RPL routing protocol for Internet of Things. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 1–8 Conti M, Kaliyar P, Rabbani MM, Ranise S (2018) SPLIT: a secure and scalable RPL routing protocol for Internet of Things. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 1–8
12.
go back to reference Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A (2018) REATO: REActing TO Denial of Service attacks in the Internet of Things. Comput Netw 137:37–48CrossRef Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A (2018) REATO: REActing TO Denial of Service attacks in the Internet of Things. Comput Netw 137:37–48CrossRef
13.
go back to reference Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39–58CrossRef Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39–58CrossRef
14.
go back to reference Qin T, Wang B, Chen R, Qin Z, Wang L (2019) IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4):958CrossRef Qin T, Wang B, Chen R, Qin Z, Wang L (2019) IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4):958CrossRef
15.
go back to reference Jamali S, Fotohi R (2017) DAWA: defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J Supercomput 73(12):5173–5196CrossRef Jamali S, Fotohi R (2017) DAWA: defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J Supercomput 73(12):5173–5196CrossRef
17.
go back to reference Sarkohaki F, Fotohi R, Ashrafian V (2017) An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. Int J Adv Comput Sci Appl IJACSA 8(4):554–561 Sarkohaki F, Fotohi R, Ashrafian V (2017) An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. Int J Adv Comput Sci Appl IJACSA 8(4):554–561
18.
go back to reference Alcaraz C (2019) Security and privacy trends in the industrial internet of things. Springer, New YorkCrossRef Alcaraz C (2019) Security and privacy trends in the industrial internet of things. Springer, New YorkCrossRef
19.
go back to reference Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7(7):10–16 Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7(7):10–16
20.
go back to reference Rathee G, Sharma A, Kumar R, Iqbal R (2019) A secure communicating things network framework for industrial IoT using blockchain technology. Ad Hoc Netw 94:101933CrossRef Rathee G, Sharma A, Kumar R, Iqbal R (2019) A secure communicating things network framework for industrial IoT using blockchain technology. Ad Hoc Netw 94:101933CrossRef
21.
go back to reference Behzad S, Fotohi R, Balov JH, Rabipour MJ (2018) An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. JCP 13(6):705–720CrossRef Behzad S, Fotohi R, Balov JH, Rabipour MJ (2018) An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. JCP 13(6):705–720CrossRef
22.
go back to reference Zhang J, Rajendran S, Sun Z, Woods R, Hanzo L (2019) Physical layer security for the internet of things: authentication and key generation. IEEE Wirel Commun 26:92–98CrossRef Zhang J, Rajendran S, Sun Z, Woods R, Hanzo L (2019) Physical layer security for the internet of things: authentication and key generation. IEEE Wirel Commun 26:92–98CrossRef
23.
go back to reference Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. Int J Comput Sci Netw Solut 2:37–56 Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. Int J Comput Sci Netw Solut 2:37–56
25.
go back to reference Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95 Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95
26.
go back to reference Fotohi R, Heydari R, Jamali S (2016) A hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103 Fotohi R, Heydari R, Jamali S (2016) A hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103
27.
go back to reference Xia J, Xu Y, Deng D, Zhou Q, Fan L (2019) Intelligent secure communication for Internet of Things with statistical channel state information of attacker. IEEE Access 7:144481–144488CrossRef Xia J, Xu Y, Deng D, Zhou Q, Fan L (2019) Intelligent secure communication for Internet of Things with statistical channel state information of attacker. IEEE Access 7:144481–144488CrossRef
28.
go back to reference Fotohi R, Jamali S, Sarkohaki F, Behzad S (2013) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci IJITCS 5(9):87–93 Fotohi R, Jamali S, Sarkohaki F, Behzad S (2013) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci IJITCS 5(9):87–93
29.
go back to reference Jamali S, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Netw 21(2):79–100CrossRef Jamali S, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Netw 21(2):79–100CrossRef
30.
go back to reference Zhang T, Zhang T, Ji X, Xu W (2019) Cuckoo-RPL: cuckoo filter based RPL for defending AMI network from blackhole attacks. In: 2019 Chinese Control Conference (CCC). IEEE, pp 8920–8925 Zhang T, Zhang T, Ji X, Xu W (2019) Cuckoo-RPL: cuckoo filter based RPL for defending AMI network from blackhole attacks. In: 2019 Chinese Control Conference (CCC). IEEE, pp 8920–8925
31.
go back to reference Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci IJITCS 5(6):2013 Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci IJITCS 5(6):2013
33.
go back to reference Jamali S, Fotohi R, Analoui M (2018) An artificial immune system based method for defense against wormhole attack in mobile adhoc networks. Tabriz J Electr Eng 47(4):1407–1419 Jamali S, Fotohi R, Analoui M (2018) An artificial immune system based method for defense against wormhole attack in mobile adhoc networks. Tabriz J Electr Eng 47(4):1407–1419
34.
go back to reference Sani AS, Yuan D, Jin J, Gao L, Yu S, Dong ZY (2019) Cyber security framework for Internet of Things-based Energy Internet. Future Gener Comput Syst 93:849–859CrossRef Sani AS, Yuan D, Jin J, Gao L, Yu S, Dong ZY (2019) Cyber security framework for Internet of Things-based Energy Internet. Future Gener Comput Syst 93:849–859CrossRef
Metadata
Title
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things
Authors
Behnam Seyedi
Reza Fotohi
Publication date
08-01-2020
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 9/2020
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-019-03143-7

Other articles of this Issue 9/2020

The Journal of Supercomputing 9/2020 Go to the issue

Premium Partner