MBAREK, Bacem, Meriem SOULA, Tomáš PITNER a Aref MEDDEB. An Effective Replica Node Detection Scheme in Internet of Things Networks. Online. In International Wireless Communications & Mobile Computing Conference (IWCMC 2023). 19th. Marrakech,Grand Mogador Menara Hotel: IEEE Xplore, 2023, s. 608-613. ISBN 979-8-3503-3339-8. Dostupné z: https://dx.doi.org/10.1109/IWCMC58020.2023.10182793.
Další formáty:   BibTeX LaTeX RIS
Základní údaje
Originální název An Effective Replica Node Detection Scheme in Internet of Things Networks
Autoři MBAREK, Bacem (788 Tunisko, domácí), Meriem SOULA, Tomáš PITNER (203 Česká republika, domácí) a Aref MEDDEB.
Vydání 19th. Marrakech,Grand Mogador Menara Hotel, International Wireless Communications & Mobile Computing Conference (IWCMC 2023), od s. 608-613, 6 s. 2023.
Nakladatel IEEE Xplore
Další údaje
Originální jazyk angličtina
Typ výsledku Stať ve sborníku
Obor 10200 1.2 Computer and information sciences
Stát vydavatele Spojené státy
Utajení není předmětem státního či obchodního tajemství
Forma vydání elektronická verze "online"
Kód RIV RIV/00216224:14330/23:00130622
Organizační jednotka Fakulta informatiky
ISBN 979-8-3503-3339-8
ISSN 2376-6492
Doi http://dx.doi.org/10.1109/IWCMC58020.2023.10182793
UT WoS 001055070000100
Klíčová slova česky IoT;Intrusion detection;Replication attack;Security
Klíčová slova anglicky IoT;Intrusion detection;Replication attack;Security
Změnil Změnil: RNDr. Pavel Šmerk, Ph.D., učo 3880. Změněno: 7. 4. 2024 22:54.
Anotace
The importance of Internet of Things (IoT) lies in its far-reaching impact on our daily lives, so it is prone to risks. Therefore, security measures must be considered before deploying IoT networks to avoid intrusions. Most of the relevant work in the literature have been dedicated to improve the intrusion detection system and security systems. However, most current Intrusion Detection System (IDS) approaches suffer from the lack of a proper testing procedures before an actual attack. In this paper, we propose a low-cost solution to detect malicious nodes by ensuring that witness nodes work properly. We propose an effective automatic detection strategy for the test sequence and selection of witness nodes. The goal is to test the automatic correct actions of a witness node when an attacker launches a replication or cloning attack. We present a case study of replication attacks in IoT and use the CupCarbon simulator to evaluate our approach and demonstrate how a compromised node could be detected among witness nodes.
VytisknoutZobrazeno: 19. 7. 2024 12:22