MBAREK, Bacem, Mouzhi GE and Tomáš PITNER. Trust-based Detection Strategy against Replication Attacks in IoT. Online. In Makoto Takizawa, Leonard Barolli, Donald Elmazi. The 35th International Conference on Advanced Information Networking and Applications (AINA-2021). Springer International Publi. Toronto, Canada: Springer, 2021, p. 646-656. ISBN 978-3-030-75074-9. Available from: https://dx.doi.org/10.1007/978-3-030-75075-6_53.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Trust-based Detection Strategy against Replication Attacks in IoT
Authors MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China) and Tomáš PITNER (203 Czech Republic, belonging to the institution).
Edition Springer International Publi. Toronto, Canada, The 35th International Conference on Advanced Information Networking and Applications (AINA-2021), p. 646-656, 11 pp. 2021.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10200 1.2 Computer and information sciences
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
WWW Springer Link
RIV identification code RIV/00216224:14330/21:00121148
Organization unit Faculty of Informatics
ISBN 978-3-030-75074-9
ISSN 2367-3370
Doi http://dx.doi.org/10.1007/978-3-030-75075-6_53
Keywords in English 6LoWPAN; Detection strategy; Internet of Things; Replication attack; Trust in IoT
Tags firank_B
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 23/5/2022 14:25.
Abstract
The integration of 6LoWPAN standard in the Internet of Things (IoT) has been emerging and applied in many domains such as smart transportation and healthcare. However, given the resource constrained nature of nodes in the IoT, 6LoWPAN is vulnerable to a variety of attacks, among others, replication attack can be launched to consume the node’s resources and degrade the network’s performance. This paper therefore proposes a trust-based detection strategy against replication attacks in IoT, where a number of replica nodes are intentionally inserted into the network to test the reliability and response of witness nodes. We further assess the feasibility of the proposed detection strategy and compare with other two strategies of brute-force and first visited with a thorough simulation, taking into account the detection probability for compromised attacks and the execution time of transactions. The simulation results show that the proposed trust-based strategy can significantly increase the detection probability to 90% on average against replication attacks, while within the number of nodes up to 1000 the detection runtime on average keeps around 60 s.
Links
CZ.02.1.01/0.0/0.0/16_019/0000822, interní kód MU
(CEP code: EF16_019/0000822)
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur (Acronym: C4e)
Investor: Ministry of Education, Youth and Sports of the CR, CyberSecurity, CyberCrime and Critical Information Infrastructures Center of Excellence, Priority axis 1: Strengthening capacities for high-quality research
EF16_019/0000822, research and development projectName: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur
PrintDisplayed: 22/7/2024 10:01