Detailed Information on Publication Record
2022
Precisional Detection Strategy for 6LoWPAN Networks in IoT
MBAREK, Bacem, Mouzhi GE and Tomáš PITNERBasic information
Original name
Precisional Detection Strategy for 6LoWPAN Networks in IoT
Authors
MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China) and Tomáš PITNER (203 Czech Republic, belonging to the institution)
Edition
Prague, International Conference on Systems, Man, and Cybernetics (SMC, p. 1006-1011, 6 pp. 2022
Publisher
IEEE
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10201 Computer sciences, information science, bioinformatics
Country of publisher
Czech Republic
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
electronic version available online
References:
RIV identification code
RIV/00216224:14330/22:00126779
Organization unit
Faculty of Informatics
ISBN
978-1-6654-5258-8
ISSN
Keywords in English
IoT; Network; 6LoWPAN; Security; Intrusion Detection.
Změněno: 18/3/2023 16:32, Bacem Mbarek, PhD
Abstract
V originále
With the rapid development of the Internet of Things (IoT), a large amount of data is exchanged between various communicating devices. Since the data should be communicated securely between the communicating devices, the network security is one of the dominant research areas for the 6LoWPAN IoT applications. Meanwhile, 6LoWPAN devices are vulnerable to attacks inherited from both the wireless sensor networks and the Internet protocols. Thus intrusion detection systems have become more and more critical and play a noteworthy role in improving the 6LoWPAN IoT networks. However, most intrusion detection systems focus on the attacked areas in the IoT networks instead of precisely on certain IoT nodes. This may lead more resources to further detect the compromised nodes or waste resources when detaching the whole attacked area. In this paper, we therefore proposed a new precisional detection strategy for 6LoWPAN Networks, named as PDS-6LoWPAN. In order to validate the strategy,we evaluate the performance and applicability of our solution with a thorough simulation by taking into account the detection accuracy and the detection response time.