Routing Attacks Detection in 6LoWPAN-Based Internet of Things

نویسندگان

چکیده

The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to limited resources devices its dynamic network topology. Routing attacks on 6LoWPAN-based can be particularly challenging detect because unique characteristics network. In recent years, several techniques have been proposed detecting routing attacks, including anomaly detection. These leverage different features traffic identify classify attacks. This paper focuses that target Protocol Low-Power Lossy Networks (RPL), which are widely used systems. discussed this categorized as either inherited from Wireless Sensor or exploiting vulnerabilities RPL (known RPL-specific attacks). describes Flood Attacks, Data-DoS/DDoS Wormhole Rank Blackhole Version Sinkhole Attacks. paper, a novel Hybrid Intrusion Detection System (HIDS) combines decision tree classifier one-class Support Vector Machine is HIDS draws strengths both Signature (SIDS) an Anomaly-based (AIDS) with high degree accuracy low false alarm rate. dataset, genuine kinds was test HIDS. According findings, hybrid IDS study outperforms SIDS AIDS approaches, higher detection rates lower positive rates.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Energy Efficient Multi Path Routing Protocol in Internet of Things

Internet of things (IoT) is a network with a wide range of smart and physical objects and gadgets that can exchange information with each other. IOT introduces a variety of services that human life is dependent on its secure and accessible activities. These networks face numerous problems in terms of energy consumption and reliable communication to send the correct data. Moreover, the character...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

improvement of Location-based Algorithm in the Internet of Things

Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...

متن کامل

Routing Attacks and Countermeasures in the RPL-Based Internet of Things

*e Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies ...

متن کامل

A Taxonomy of Attacks in RPL-based Internet of Things

The growing interest for the Internet of Things is contributing to the large-scale deployment of Low power and Lossy Networks (LLN). These networks support communications amongst objects from the real world, such as home automation devices and embedded sensors, and their interconnection to the Internet. An open standard routing protocol, called RPL, has been specified by the IETF in order to ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2023

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics12061320