Detailed Information on Publication Record
2021
Trust-based Detection Strategy against Replication Attacks in IoT
MBAREK, Bacem, Mouzhi GE and Tomáš PITNERBasic information
Original name
Trust-based Detection Strategy against Replication Attacks in IoT
Authors
MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China) and Tomáš PITNER (203 Czech Republic, belonging to the institution)
Edition
Springer International Publi. Toronto, Canada, The 35th International Conference on Advanced Information Networking and Applications (AINA-2021), p. 646-656, 11 pp. 2021
Publisher
Springer
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10200 1.2 Computer and information sciences
Country of publisher
United States of America
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
electronic version available online
References:
RIV identification code
RIV/00216224:14330/21:00121148
Organization unit
Faculty of Informatics
ISBN
978-3-030-75074-9
ISSN
Keywords in English
6LoWPAN; Detection strategy; Internet of Things; Replication attack; Trust in IoT
Tags
International impact, Reviewed
Změněno: 23/5/2022 14:25, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
The integration of 6LoWPAN standard in the Internet of Things (IoT) has been emerging and applied in many domains such as smart transportation and healthcare. However, given the resource constrained nature of nodes in the IoT, 6LoWPAN is vulnerable to a variety of attacks, among others, replication attack can be launched to consume the node’s resources and degrade the network’s performance. This paper therefore proposes a trust-based detection strategy against replication attacks in IoT, where a number of replica nodes are intentionally inserted into the network to test the reliability and response of witness nodes. We further assess the feasibility of the proposed detection strategy and compare with other two strategies of brute-force and first visited with a thorough simulation, taking into account the detection probability for compromised attacks and the execution time of transactions. The simulation results show that the proposed trust-based strategy can significantly increase the detection probability to 90% on average against replication attacks, while within the number of nodes up to 1000 the detection runtime on average keeps around 60 s.
Links
CZ.02.1.01/0.0/0.0/16_019/0000822, interní kód MU (CEP code: EF16_019/0000822) |
| ||
EF16_019/0000822, research and development project |
|