J 2021

Proactive Trust Classification for Detection of Replication Attacks in 6LoWPAN-based IoT

MBAREK, Bacem; Mouzhi GE and Tomáš PITNER

Basic information

Original name

Proactive Trust Classification for Detection of Replication Attacks in 6LoWPAN-based IoT

Authors

MBAREK, Bacem (788 Tunisia, belonging to the institution); Mouzhi GE (156 China) and Tomáš PITNER ORCID (203 Czech Republic, belonging to the institution)

Edition

Internet of Things; Engineering Cyber Physical Human Systems, ELSEVIER, 2021, 2543-1536

Other information

Language

English

Type of outcome

Article in a journal

Field of Study

10200 1.2 Computer and information sciences

Country of publisher

Netherlands

Confidentiality degree

is not subject to a state or trade secret

References:

Impact factor

Impact factor: 5.711

RIV identification code

RIV/00216224:14330/21:00122050

Organization unit

Faculty of Informatics

UT WoS

000723420400014

EID Scopus

2-s2.0-85115010510

Keywords in English

Internet of Things; Detection strategy; Trust in IoT; Replication attack; 6LoWPAN

Tags

International impact, Reviewed
Changed: 23/5/2022 14:55, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

The 6LoWPAN standard has been widely applied in different Internet of Things (IoT) application domains. However, since the nodes in the IoT are mostly resource constrained, 6LoWPAN is vulnerable to a variety of security attacks. Among others, replication attack is one of the severe security threads to IoT networks. This paper therefore proposes a trust-based detection strategy against replication attacks in IoT, where a number of replica nodes are intentionally inserted into the network to test the reliability and response of witness nodes. We further assess the feasibility of the proposed detection strategy and compare with two other strategies such as brute-force and first visited strategy via a thorough simulation. The evaluation takes into account the detection probability for compromised attacks, the execution time of transactions and rate of communication failure. The simulation results show that while maintaining detection runtime on average 60 s for up to 1000 nodes, the proposed trust-based strategy can significantly increase the detection probability to 90% on average against replication attacks and in turn significantly reduce the communication failure.