D 2021

Trust-based Detection Strategy against Replication Attacks in IoT

MBAREK, Bacem, Mouzhi GE and Tomáš PITNER

Basic information

Original name

Trust-based Detection Strategy against Replication Attacks in IoT

Authors

MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China) and Tomáš PITNER (203 Czech Republic, belonging to the institution)

Edition

Springer International Publi. Toronto, Canada, The 35th International Conference on Advanced Information Networking and Applications (AINA-2021), p. 646-656, 11 pp. 2021

Publisher

Springer

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10200 1.2 Computer and information sciences

Country of publisher

United States of America

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

electronic version available online

References:

RIV identification code

RIV/00216224:14330/21:00121148

Organization unit

Faculty of Informatics

ISBN

978-3-030-75074-9

ISSN

Keywords in English

6LoWPAN; Detection strategy; Internet of Things; Replication attack; Trust in IoT

Tags

International impact, Reviewed
Změněno: 23/5/2022 14:25, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

The integration of 6LoWPAN standard in the Internet of Things (IoT) has been emerging and applied in many domains such as smart transportation and healthcare. However, given the resource constrained nature of nodes in the IoT, 6LoWPAN is vulnerable to a variety of attacks, among others, replication attack can be launched to consume the node’s resources and degrade the network’s performance. This paper therefore proposes a trust-based detection strategy against replication attacks in IoT, where a number of replica nodes are intentionally inserted into the network to test the reliability and response of witness nodes. We further assess the feasibility of the proposed detection strategy and compare with other two strategies of brute-force and first visited with a thorough simulation, taking into account the detection probability for compromised attacks and the execution time of transactions. The simulation results show that the proposed trust-based strategy can significantly increase the detection probability to 90% on average against replication attacks, while within the number of nodes up to 1000 the detection runtime on average keeps around 60 s.

Links

CZ.02.1.01/0.0/0.0/16_019/0000822, interní kód MU
(CEP code: EF16_019/0000822)
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur (Acronym: C4e)
Investor: Ministry of Education, Youth and Sports of the CR, CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence, Priority axis 1: Strengthening capacities for high-quality research
EF16_019/0000822, research and development project
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur