Routing Attacks Detection in 6LoWPAN-Based Internet of Things
نویسندگان
چکیده
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to limited resources devices its dynamic network topology. Routing attacks on 6LoWPAN-based can be particularly challenging detect because unique characteristics network. In recent years, several techniques have been proposed detecting routing attacks, including anomaly detection. These leverage different features traffic identify classify attacks. This paper focuses that target Protocol Low-Power Lossy Networks (RPL), which are widely used systems. discussed this categorized as either inherited from Wireless Sensor or exploiting vulnerabilities RPL (known RPL-specific attacks). describes Flood Attacks, Data-DoS/DDoS Wormhole Rank Blackhole Version Sinkhole Attacks. paper, a novel Hybrid Intrusion Detection System (HIDS) combines decision tree classifier one-class Support Vector Machine is HIDS draws strengths both Signature (SIDS) an Anomaly-based (AIDS) with high degree accuracy low false alarm rate. dataset, genuine kinds was test HIDS. According findings, hybrid IDS study outperforms SIDS AIDS approaches, higher detection rates lower positive rates.
منابع مشابه
Energy Efficient Multi Path Routing Protocol in Internet of Things
Internet of things (IoT) is a network with a wide range of smart and physical objects and gadgets that can exchange information with each other. IOT introduces a variety of services that human life is dependent on its secure and accessible activities. These networks face numerous problems in terms of energy consumption and reliable communication to send the correct data. Moreover, the character...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملRouting Attacks and Countermeasures in the RPL-Based Internet of Things
*e Routing Protocol for Low-Power and Lossy Networks (RPL) is a novel routing protocol standardized for constrained environments such as 6LoWPAN networks. Providing security in IPv6/RPL connected 6LoWPANs is challenging because the devices are connected to the untrusted Internet and are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies ...
متن کاملA Taxonomy of Attacks in RPL-based Internet of Things
The growing interest for the Internet of Things is contributing to the large-scale deployment of Low power and Lossy Networks (LLN). These networks support communications amongst objects from the real world, such as home automation devices and embedded sensors, and their interconnection to the Internet. An open standard routing protocol, called RPL, has been specified by the IETF in order to ad...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2023
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics12061320