Javascript must be enabled to continue!
Wormhole Attack Detection System for IoT Network: A Hybrid Approach
View through CrossRef
Abstract
Many errors in data communication cause security attacks in Internet of Things (IoT). Routing errors which are prominent errors in IoT, degrade the quality of data communication. Many attacks like sinkhole attack, blackhole attack, selective forwarding attack and wormhole attack enter the network through network layer of the IoT. This paper has an emphasis on the wormhole attack detection because it is one of the most uncompromising attacks at the network layer of IoT protocol stack. The wormhole attack inserts wrong routes information in the network; it also alters the network information by causing failure of the location-dependent protocols thus defeating the purpose of routing algorithms. The wormhole attack is activated in the network by forming a tunnel between two long-distance nodes. These nodes create an illusion that they are directly connected and nearer to each other. They attract legitimate nodes to transmit data through them by advertising less hop-count. Most of the time, due to the presence of attack, packets take the long route and reduce their strength. This paper covers the design and implementation of an innovative intrusion detection system for the IoT that detects the wormhole attack and the attacker nodes. The presence of the wormhole attack is identified using location information of any node and its neighbor with the help of Received Signal Strength Indicator (RSSI) values and hop-count. The proposed system is energy efficient and hence it is beneficial for a resource-constrained environment of IoT. It also provides precise true-positive and false-positive detection rate.
Title: Wormhole Attack Detection System for IoT Network: A Hybrid Approach
Description:
Abstract
Many errors in data communication cause security attacks in Internet of Things (IoT).
Routing errors which are prominent errors in IoT, degrade the quality of data communication.
Many attacks like sinkhole attack, blackhole attack, selective forwarding attack and wormhole attack enter the network through network layer of the IoT.
This paper has an emphasis on the wormhole attack detection because it is one of the most uncompromising attacks at the network layer of IoT protocol stack.
The wormhole attack inserts wrong routes information in the network; it also alters the network information by causing failure of the location-dependent protocols thus defeating the purpose of routing algorithms.
The wormhole attack is activated in the network by forming a tunnel between two long-distance nodes.
These nodes create an illusion that they are directly connected and nearer to each other.
They attract legitimate nodes to transmit data through them by advertising less hop-count.
Most of the time, due to the presence of attack, packets take the long route and reduce their strength.
This paper covers the design and implementation of an innovative intrusion detection system for the IoT that detects the wormhole attack and the attacker nodes.
The presence of the wormhole attack is identified using location information of any node and its neighbor with the help of Received Signal Strength Indicator (RSSI) values and hop-count.
The proposed system is energy efficient and hence it is beneficial for a resource-constrained environment of IoT.
It also provides precise true-positive and false-positive detection rate.
Related Results
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security th...
A Hybridized Immune System for Avoidance of Wormhole Attacks in Manet
A Hybridized Immune System for Avoidance of Wormhole Attacks in Manet
In Mobile Ad-hoc Networks (MANETs), the most challenging task is detecting and mitigating wormhole links during data transmission between the source and destination nodes. Since it...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Experimental Investigation of Particulate Polylactic Acid Diversion in Matrix Acidizing
Experimental Investigation of Particulate Polylactic Acid Diversion in Matrix Acidizing
Abstract
Polylactic Acid (PLA) is increasingly used in the oil industry and specifically for diversion in matrix acidizing as evidenced by a number of field cases re...
DAIWN: Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks
DAIWN: Detection and Isolation of Wormhole Nodes in Wireless Ad Hoc Networks
Abstract
The wormhole attack is one of the most treacherous attacks projected at the routing layer that can bypass cryptographicmeasures and derail the entire communication...
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
Abstract: This research focuses on technology and integration tools for IoT environments, with an emphasis on three main aspects: the integration of Building Information Modeling (...
Integrated Acid Fracture Model with Reservoir Simulation Under Non-Isothermal Condition
Integrated Acid Fracture Model with Reservoir Simulation Under Non-Isothermal Condition
Abstract
Modeling of acid fracturing process is challenging because of the coupled complex effects of flow through porous media and fractures, chemical reaction in a...

