Detailed Information on Publication Record
2023
An Effective Replica Node Detection Scheme in Internet of Things Networks
MBAREK, Bacem, Meriem SOULA, Tomáš PITNER and Aref MEDDEBBasic information
Original name
An Effective Replica Node Detection Scheme in Internet of Things Networks
Authors
MBAREK, Bacem (788 Tunisia, belonging to the institution), Meriem SOULA, Tomáš PITNER (203 Czech Republic, belonging to the institution) and Aref MEDDEB
Edition
19th. Marrakech,Grand Mogador Menara Hotel, International Wireless Communications & Mobile Computing Conference (IWCMC 2023), p. 608-613, 6 pp. 2023
Publisher
IEEE Xplore
Other information
Language
English
Type of outcome
Stať ve sborníku
Field of Study
10200 1.2 Computer and information sciences
Country of publisher
United States of America
Confidentiality degree
není předmětem státního či obchodního tajemství
Publication form
electronic version available online
RIV identification code
RIV/00216224:14330/23:00130622
Organization unit
Faculty of Informatics
ISBN
979-8-3503-3339-8
ISSN
UT WoS
001055070000100
Keywords (in Czech)
IoT;Intrusion detection;Replication attack;Security
Keywords in English
IoT;Intrusion detection;Replication attack;Security
Změněno: 7/4/2024 22:54, RNDr. Pavel Šmerk, Ph.D.
Abstract
V originále
The importance of Internet of Things (IoT) lies in its far-reaching impact on our daily lives, so it is prone to risks. Therefore, security measures must be considered before deploying IoT networks to avoid intrusions. Most of the relevant work in the literature have been dedicated to improve the intrusion detection system and security systems. However, most current Intrusion Detection System (IDS) approaches suffer from the lack of a proper testing procedures before an actual attack. In this paper, we propose a low-cost solution to detect malicious nodes by ensuring that witness nodes work properly. We propose an effective automatic detection strategy for the test sequence and selection of witness nodes. The goal is to test the automatic correct actions of a witness node when an attacker launches a replication or cloning attack. We present a case study of replication attacks in IoT and use the CupCarbon simulator to evaluate our approach and demonstrate how a compromised node could be detected among witness nodes.