D 2023

An Effective Replica Node Detection Scheme in Internet of Things Networks

MBAREK, Bacem, Meriem SOULA, Tomáš PITNER a Aref MEDDEB

Základní údaje

Originální název

An Effective Replica Node Detection Scheme in Internet of Things Networks

Autoři

MBAREK, Bacem (788 Tunisko, domácí), Meriem SOULA, Tomáš PITNER (203 Česká republika, domácí) a Aref MEDDEB

Vydání

19th. Marrakech,Grand Mogador Menara Hotel, International Wireless Communications & Mobile Computing Conference (IWCMC 2023), od s. 608-613, 6 s. 2023

Nakladatel

IEEE Xplore

Další údaje

Jazyk

angličtina

Typ výsledku

Stať ve sborníku

Obor

10200 1.2 Computer and information sciences

Stát vydavatele

Spojené státy

Utajení

není předmětem státního či obchodního tajemství

Forma vydání

elektronická verze "online"

Kód RIV

RIV/00216224:14330/23:00130622

Organizační jednotka

Fakulta informatiky

ISBN

979-8-3503-3339-8

ISSN

UT WoS

001055070000100

Klíčová slova česky

IoT;Intrusion detection;Replication attack;Security

Klíčová slova anglicky

IoT;Intrusion detection;Replication attack;Security

Štítky

Změněno: 7. 4. 2024 22:54, RNDr. Pavel Šmerk, Ph.D.

Anotace

V originále

The importance of Internet of Things (IoT) lies in its far-reaching impact on our daily lives, so it is prone to risks. Therefore, security measures must be considered before deploying IoT networks to avoid intrusions. Most of the relevant work in the literature have been dedicated to improve the intrusion detection system and security systems. However, most current Intrusion Detection System (IDS) approaches suffer from the lack of a proper testing procedures before an actual attack. In this paper, we propose a low-cost solution to detect malicious nodes by ensuring that witness nodes work properly. We propose an effective automatic detection strategy for the test sequence and selection of witness nodes. The goal is to test the automatic correct actions of a witness node when an attacker launches a replication or cloning attack. We present a case study of replication attacks in IoT and use the CupCarbon simulator to evaluate our approach and demonstrate how a compromised node could be detected among witness nodes.