D 2022

Precisional Detection Strategy for 6LoWPAN Networks in IoT

MBAREK, Bacem, Mouzhi GE and Tomáš PITNER

Basic information

Original name

Precisional Detection Strategy for 6LoWPAN Networks in IoT

Authors

MBAREK, Bacem (788 Tunisia, belonging to the institution), Mouzhi GE (156 China) and Tomáš PITNER (203 Czech Republic, belonging to the institution)

Edition

Prague, International Conference on Systems, Man, and Cybernetics (SMC, p. 1006-1011, 6 pp. 2022

Publisher

IEEE

Other information

Language

English

Type of outcome

Stať ve sborníku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

Czech Republic

Confidentiality degree

není předmětem státního či obchodního tajemství

Publication form

electronic version available online

References:

RIV identification code

RIV/00216224:14330/22:00126779

Organization unit

Faculty of Informatics

ISBN

978-1-6654-5258-8

ISSN

Keywords in English

IoT; Network; 6LoWPAN; Security; Intrusion Detection.
Změněno: 18/3/2023 16:32, Bacem Mbarek, PhD

Abstract

V originále

With the rapid development of the Internet of Things (IoT), a large amount of data is exchanged between various communicating devices. Since the data should be communicated securely between the communicating devices, the network security is one of the dominant research areas for the 6LoWPAN IoT applications. Meanwhile, 6LoWPAN devices are vulnerable to attacks inherited from both the wireless sensor networks and the Internet protocols. Thus intrusion detection systems have become more and more critical and play a noteworthy role in improving the 6LoWPAN IoT networks. However, most intrusion detection systems focus on the attacked areas in the IoT networks instead of precisely on certain IoT nodes. This may lead more resources to further detect the compromised nodes or waste resources when detaching the whole attacked area. In this paper, we therefore proposed a new precisional detection strategy for 6LoWPAN Networks, named as PDS-6LoWPAN. In order to validate the strategy,we evaluate the performance and applicability of our solution with a thorough simulation by taking into account the detection accuracy and the detection response time.