Skip to main content

2020 | OriginalPaper | Buchkapitel

Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network

verfasst von : Pradeepkumar Bhale, Sukanta Dey, Santosh Biswas, Sukumar Nandi

Erschienen in: Innovations for Community Services

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) has become a widespread technology where everyday objects are being transferred toward intelligent devices. These smart devices incorporate sensing, computing, and networking abilities into them. A smartphone, a smartwatch can be utilized for various tasks other than calling and timekeeping. Even home appliances also incorporate a midrange computer. Therefore, the most advanced applications and services have considerably risen. Despite numerous gains, security threats increased in terms of recorded catastrophic events as well as attack severity. There are multiple threads in 6LoWPAN and related routing protocol. In our research paper, we perform and assess an energy-efficient, lightweight intrusion detection system (IDS) for the 6LoWPAN network. The primary goal of this paper to target routing attacks (i.e., selective-forwarding, sinkhole, etc.). Our intended energy-efficient lightweight defense solution which identifies sinkhole attack in the IoT ecosystem. The defense method is executed with the help of Cooja network simulator on the Contiki OS. The experimental outcomes show that the solution is lightweight and can identify the sinkhole attack with a noteworthy performance, and provides 95.86% TPR and 94.31% TNR rate. It also shows minimum memory (RAM/ROM) utilization and energy consumption, which is comparable.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and IoT-based emerging services systems. Cluster Comput. 22(1), 71–91 (2019)CrossRef Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and IoT-based emerging services systems. Cluster Comput. 22(1), 71–91 (2019)CrossRef
3.
Zurück zum Zitat Mekki, K., Bajic, E., Chaxel, F., Meyer, F.: A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 5(1), 1–7 (2019)CrossRef Mekki, K., Bajic, E., Chaxel, F., Meyer, F.: A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 5(1), 1–7 (2019)CrossRef
7.
Zurück zum Zitat Passos, L., et al.: A study of feature scattering in the Linux kernel. IEEE Trans. Softw. Eng. (2018) Passos, L., et al.: A study of feature scattering in the Linux kernel. IEEE Trans. Softw. Eng. (2018)
8.
Zurück zum Zitat Gershuni, E., et al.: Simple and precise static analysis of untrusted Linux kernel extensions. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 1069–1084. ACM (2019) Gershuni, E., et al.: Simple and precise static analysis of untrusted Linux kernel extensions. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 1069–1084. ACM (2019)
9.
Zurück zum Zitat Krčo, S., Pokrić, B., Carrez, F.: Designing IoT architecture(s): a European perspective. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 79–84. IEEE (2014) Krčo, S., Pokrić, B., Carrez, F.: Designing IoT architecture(s): a European perspective. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 79–84. IEEE (2014)
10.
Zurück zum Zitat Radanliev, P., De Roure, D., Nicolescu, R., Huth, M.: A reference architecture for integrating the industrial Internet of Things in the industry 4.0. arXiv preprint arXiv:1903.04369 (2019) Radanliev, P., De Roure, D., Nicolescu, R., Huth, M.: A reference architecture for integrating the industrial Internet of Things in the industry 4.0. arXiv preprint arXiv:​1903.​04369 (2019)
11.
Zurück zum Zitat Airehrour, D., Gutierrez, J.A., Ray, S.K.: SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 93, 860–876 (2019)CrossRef Airehrour, D., Gutierrez, J.A., Ray, S.K.: SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 93, 860–876 (2019)CrossRef
12.
Zurück zum Zitat Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1582–1606 (2018)CrossRef Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1582–1606 (2018)CrossRef
13.
Zurück zum Zitat Zikria, Y.B., Afzal, M.K., Ishmanov, F., Kim, S.W., Yu, H.: A survey on routing protocols supported by the Contiki Internet of Things operating system. Future Gener. Comput. Syst. 82, 200–219 (2018)CrossRef Zikria, Y.B., Afzal, M.K., Ishmanov, F., Kim, S.W., Yu, H.: A survey on routing protocols supported by the Contiki Internet of Things operating system. Future Gener. Comput. Syst. 82, 200–219 (2018)CrossRef
15.
Zurück zum Zitat Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRef Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)CrossRef
16.
Zurück zum Zitat Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)CrossRef
17.
Zurück zum Zitat Khandelwal, M., Gupta, D.K., Bhale, P.: DoS attack detection technique using back propagation neural network. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1064–1068. IEEE (2016) Khandelwal, M., Gupta, D.K., Bhale, P.: DoS attack detection technique using back propagation neural network. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1064–1068. IEEE (2016)
18.
Zurück zum Zitat Agrawal, N., Pradeepkumar, B., Tapaswi, S.: Preventing ARP spoofing in WLAN using SHA-512. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013) Agrawal, N., Pradeepkumar, B., Tapaswi, S.: Preventing ARP spoofing in WLAN using SHA-512. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013)
20.
Zurück zum Zitat Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based IDS for securing RPL from topology attacks. In: 2011 IFIP Wireless Days (WD), pp. 1–3. IEEE (2011) Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based IDS for securing RPL from topology attacks. In: 2011 IFIP Wireless Days (WD), pp. 1–3. IEEE (2011)
21.
Zurück zum Zitat Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)CrossRef Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)CrossRef
22.
Zurück zum Zitat Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015) Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015)
23.
Zurück zum Zitat Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015) Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015)
24.
Zurück zum Zitat Glissa, G., Rachedi, A., Meddeb, A.: A secure routing protocol based on RPL for Internet of Things. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE (2016) Glissa, G., Rachedi, A., Meddeb, A.: A secure routing protocol based on RPL for Internet of Things. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE (2016)
25.
Zurück zum Zitat Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J. 4(6), 2129–2141 (2017)CrossRef Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J. 4(6), 2129–2141 (2017)CrossRef
26.
Zurück zum Zitat Raoof, A., Matrawy, A., Lung, C.H.: Secure routing in IoT: evaluation of RPL secure mode under attacks. arXiv preprint arXiv:1905.10314 (2019) Raoof, A., Matrawy, A., Lung, C.H.: Secure routing in IoT: evaluation of RPL secure mode under attacks. arXiv preprint arXiv:​1905.​10314 (2019)
27.
Zurück zum Zitat Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: 2017 International Conference on Emerging Trends and Innovation in ICT (ICEI), pp. 33–39. IEEE (2017) Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: 2017 International Conference on Emerging Trends and Innovation in ICT (ICEI), pp. 33–39. IEEE (2017)
28.
Zurück zum Zitat Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)CrossRef Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)CrossRef
29.
Zurück zum Zitat Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors 19(9), 1977 (2019)CrossRef Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors 19(9), 1977 (2019)CrossRef
Metadaten
Titel
Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network
verfasst von
Pradeepkumar Bhale
Sukanta Dey
Santosh Biswas
Sukumar Nandi
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37484-6_11