2021
Proactive Trust Classification for Detection of Replication Attacks in 6LoWPAN-based IoT
MBAREK, Bacem; Mouzhi GE and Tomáš PITNERBasic information
Original name
Proactive Trust Classification for Detection of Replication Attacks in 6LoWPAN-based IoT
Authors
MBAREK, Bacem (788 Tunisia, belonging to the institution); Mouzhi GE (156 China) and Tomáš PITNER ORCID (203 Czech Republic, belonging to the institution)
Edition
Internet of Things; Engineering Cyber Physical Human Systems, ELSEVIER, 2021, 2543-1536
Other information
Language
English
Type of outcome
Article in a journal
Field of Study
10200 1.2 Computer and information sciences
Country of publisher
Netherlands
Confidentiality degree
is not subject to a state or trade secret
References:
Impact factor
Impact factor: 5.711
RIV identification code
RIV/00216224:14330/21:00122050
Organization unit
Faculty of Informatics
UT WoS
000723420400014
EID Scopus
2-s2.0-85115010510
Keywords in English
Internet of Things; Detection strategy; Trust in IoT; Replication attack; 6LoWPAN
Tags
International impact, Reviewed
Changed: 23/5/2022 14:55, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
The 6LoWPAN standard has been widely applied in different Internet of Things (IoT) application domains. However, since the nodes in the IoT are mostly resource constrained, 6LoWPAN is vulnerable to a variety of security attacks. Among others, replication attack is one of the severe security threads to IoT networks. This paper therefore proposes a trust-based detection strategy against replication attacks in IoT, where a number of replica nodes are intentionally inserted into the network to test the reliability and response of witness nodes. We further assess the feasibility of the proposed detection strategy and compare with two other strategies such as brute-force and first visited strategy via a thorough simulation. The evaluation takes into account the detection probability for compromised attacks, the execution time of transactions and rate of communication failure. The simulation results show that while maintaining detection runtime on average 60 s for up to 1000 nodes, the proposed trust-based strategy can significantly increase the detection probability to 90% on average against replication attacks and in turn significantly reduce the communication failure.