Skip to main content
Erschienen in: The Journal of Supercomputing 9/2020

10.01.2020

Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

verfasst von: Kobra Mabodi, Mehdi Yusefi, Shahram Zandiyan, Leili Irankhah, Reza Fotohi

Erschienen in: The Journal of Supercomputing | Ausgabe 9/2020

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services. Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole. In the gray hole attack, the attacker fakes itself as the shortest path to the destination that is a thing here. This causes the routing packets not to reach the destination. The proposed method is based on the AODV routing protocol and is presented under the MTISS-IoT name which means for the reduction of gray hole attacks using check node information. In this paper, a hybrid approach is proposed based on cryptographic authentication. The proposed approach consists of four phases, such as the verifying node trust in the IoT, testing the routes, gray hole attack discovery, and the malicious attack elimination process in MTISS-IoT. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the MTISS-IoT method can achieve a false positive rate of 14.104%, a false negative rate of 17.49%, and a detection rate of 94.5% when gray hole attack was launched.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Doubtful.
 
Literatur
1.
Zurück zum Zitat Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213CrossRef Airehrour D, Gutierrez J, Ray SK (2016) Secure routing for internet of things: a survey. J Netw Comput Appl 66:198–213CrossRef
3.
Zurück zum Zitat Behzad S, Fotohi R, Dadgar F (2015) Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. Int J Comput Sci and Netw Solut (IJCSNS) 3:89–103 Behzad S, Fotohi R, Dadgar F (2015) Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. Int J Comput Sci and Netw Solut (IJCSNS) 3:89–103
4.
Zurück zum Zitat Fotohi R (2020) Securing of unmanned aerial systems (UAS) against security threats using human immune system. Reliab Eng Syst Saf 193:106675CrossRef Fotohi R (2020) Securing of unmanned aerial systems (UAS) against security threats using human immune system. Reliab Eng Syst Saf 193:106675CrossRef
5.
Zurück zum Zitat Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71CrossRef Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for internet of things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71CrossRef
6.
Zurück zum Zitat Sahay R, Geethakumari G, Mitra B, Thejas V (2018). Exponential smoothing based approach for detection of blackhole attacks in IoT. In: 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6 Sahay R, Geethakumari G, Mitra B, Thejas V (2018). Exponential smoothing based approach for detection of blackhole attacks in IoT. In: 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6
7.
Zurück zum Zitat Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Intern Things J 4(6):2129–2141CrossRef Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Intern Things J 4(6):2129–2141CrossRef
9.
Zurück zum Zitat Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for Rpl-based internet of things. IEEE Commun Surv Tutorials 21(2):1582–1606CrossRef Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for Rpl-based internet of things. IEEE Commun Surv Tutorials 21(2):1582–1606CrossRef
10.
Zurück zum Zitat Bhalaji N, Hariharasudan KS, Aashika K (2019) A trust based mechanism to combat blackhole attack in RPL protocol. In: International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore pp 457–464 Bhalaji N, Hariharasudan KS, Aashika K (2019) A trust based mechanism to combat blackhole attack in RPL protocol. In: International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore pp 457–464
11.
Zurück zum Zitat Patel HB, Jinwala DC (2019) Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE, pp 947–954 Patel HB, Jinwala DC (2019) Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE, pp 947–954
12.
Zurück zum Zitat Conti M, Kaliyar P, Rabbani MM, Ranise S (2018) SPLIT: a secure and scalable RPL routing protocol for internet of things. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 1–8 Conti M, Kaliyar P, Rabbani MM, Ranise S (2018) SPLIT: a secure and scalable RPL routing protocol for internet of things. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 1–8
13.
Zurück zum Zitat Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A (2018) REATO: REActing to denial of service attacks in the internet of things. Comput Netw 137:37–48CrossRef Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A (2018) REATO: REActing to denial of service attacks in the internet of things. Comput Netw 137:37–48CrossRef
14.
Zurück zum Zitat Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39–58CrossRef Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39–58CrossRef
15.
Zurück zum Zitat Qin T, Wang B, Chen R, Qin Z, Wang L (2019) IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4):958CrossRef Qin T, Wang B, Chen R, Qin Z, Wang L (2019) IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4):958CrossRef
16.
Zurück zum Zitat Jamali S, Fotohi R (2017) DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J Supercomput 73(12):5173–5196CrossRef Jamali S, Fotohi R (2017) DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J Supercomput 73(12):5173–5196CrossRef
18.
Zurück zum Zitat Sarkohaki F, Fotohi R, Ashrafian V (2017) An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. Int J Adv Comput Sci Appl (IJACSA) 8(4):554–561 Sarkohaki F, Fotohi R, Ashrafian V (2017) An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. Int J Adv Comput Sci Appl (IJACSA) 8(4):554–561
19.
Zurück zum Zitat Alcaraz C (2019) Security and privacy trends in the industrial internet of things. Springer, BerlinCrossRef Alcaraz C (2019) Security and privacy trends in the industrial internet of things. Springer, BerlinCrossRef
20.
Zurück zum Zitat Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7(7):10–16 Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7(7):10–16
21.
Zurück zum Zitat Rathee G, Sharma A, Kumar R, Iqbal R (2019) A secure communicating things network framework for industrial IoT using blockchain technology. Ad Hoc Netw 94:101933CrossRef Rathee G, Sharma A, Kumar R, Iqbal R (2019) A secure communicating things network framework for industrial IoT using blockchain technology. Ad Hoc Netw 94:101933CrossRef
22.
Zurück zum Zitat Behzad S, Fotohi R, Balov JH, Rabipour MJ (2018) An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. JCP 13(6):705–720CrossRef Behzad S, Fotohi R, Balov JH, Rabipour MJ (2018) An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. JCP 13(6):705–720CrossRef
24.
Zurück zum Zitat Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile ad hoc networks. Int J Comput Sci Netw Solut 2:37–56 Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile ad hoc networks. Int J Comput Sci Netw Solut 2:37–56
26.
Zurück zum Zitat Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95 Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95
27.
Zurück zum Zitat Fotohi R, Heydari R, Jamali S (2016) A Hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103 Fotohi R, Heydari R, Jamali S (2016) A Hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103
28.
Zurück zum Zitat Xia J, Xu Y, Deng D, Zhou Q, Fan L (2019) Intelligent secure communication for internet of things with statistical channel state information of attacker. IEEE Access 7:144481–144488CrossRef Xia J, Xu Y, Deng D, Zhou Q, Fan L (2019) Intelligent secure communication for internet of things with statistical channel state information of attacker. IEEE Access 7:144481–144488CrossRef
29.
Zurück zum Zitat Fotohi R, Jamali S, Sarkohaki F, Behzad S (2013) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci (IJITCS) 5(9):87–93 Fotohi R, Jamali S, Sarkohaki F, Behzad S (2013) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci (IJITCS) 5(9):87–93
30.
Zurück zum Zitat Jamali S, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Netw 21(2):79–100CrossRef Jamali S, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Netw 21(2):79–100CrossRef
31.
Zurück zum Zitat Zhang T, Zhang T, Ji X, Xu W (2019) Cuckoo-RPL: cuckoo filter based RPL for defending AMI network from blackhole attacks. In: 2019 Chinese Control Conference (CCC). IEEE, pp 8920–8925 Zhang T, Zhang T, Ji X, Xu W (2019) Cuckoo-RPL: cuckoo filter based RPL for defending AMI network from blackhole attacks. In: 2019 Chinese Control Conference (CCC). IEEE, pp 8920–8925
32.
Zurück zum Zitat Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile ad hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci (IJITCS) 5(6):2013 Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile ad hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci (IJITCS) 5(6):2013
33.
Zurück zum Zitat Kandhoul N, Dhurandher SK, Woungang I (2019) T_CAFE: a trust based security approach for opportunistic IoT. IET Commun Kandhoul N, Dhurandher SK, Woungang I (2019) T_CAFE: a trust based security approach for opportunistic IoT. IET Commun
34.
Zurück zum Zitat Jamali S, Fotohi R, Analoui M (2018) An artificial immune system based method for defense against wormhole attack in mobile adhoc networks. Tabriz J Electr Eng 47(4):1407–1419 Jamali S, Fotohi R, Analoui M (2018) An artificial immune system based method for defense against wormhole attack in mobile adhoc networks. Tabriz J Electr Eng 47(4):1407–1419
35.
Zurück zum Zitat Sani AS, Yuan D, Jin J, Gao L, Yu S, Dong ZY (2019) Cyber security framework for internet of things-based energy internet. Future Gener Comput Syst 93:849–859CrossRef Sani AS, Yuan D, Jin J, Gao L, Yu S, Dong ZY (2019) Cyber security framework for internet of things-based energy internet. Future Gener Comput Syst 93:849–859CrossRef
Metadaten
Titel
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication
verfasst von
Kobra Mabodi
Mehdi Yusefi
Shahram Zandiyan
Leili Irankhah
Reza Fotohi
Publikationsdatum
10.01.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 9/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-019-03137-5

Weitere Artikel der Ausgabe 9/2020

The Journal of Supercomputing 9/2020 Zur Ausgabe