A context-aware information-based clone node attack detection scheme in Internet of Things

نویسندگان

چکیده

The rapidly expanding nature of the Internet Things (IoT) networks is beginning to attract interest across a range applications, including smart homes, transportation, health, and industrial contexts such as robotics. This cutting-edge technology enables individuals track control their integrated environment in real-time remotely via thousands IoT devices comprised sensors actuators that actively participate sensing, processing, storing sharing information. Nonetheless, are frequently deployed hostile environments, wherein adversaries attempt capture them order seize entire network. One example potentially malicious behaviour cloning devices, which an attacker can physically obtain some sensitive information, duplicate intelligently deploy desired locations conduct various insider attacks. A device attack on significant security concern since it allows for selective forwarding, sink-hole, black-hole, warm-hole To address this issue, paper provides efficient scheme detecting clone node mobile uses semantic information known context locate securely. We design location proof mechanism by combining proofs batch verification extended elliptic curve digital signature technique (ECDSA*) accelerate process at selected trusted nodes. Furthermore, we present model selecting trustworthy based profile capabilities, enabling be chosen from other proof-verification procedure. Compared with existing studies, performance analysis experimental results suggest our proposed high degree detection accuracy minimal time significantly reduces computation, communication, energy storage overheads.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Clone Attack Detection in MWSN Using Neighbor Node Information

Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate no...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

Modeling a Smart Hospital Information Architecture Based on Internet of Things and Recommender Agent

Introduction: Today, healthcare organizations worldwide are aware of the significance of technology and its impact on the quality of care. Hospitals are one of the most crucial systems in which the utilization of information is particularly important for several reasons. Using discrete-event simulation and developing a recommender agent, this study aimed to allocate IoT devices to patients in s...

متن کامل

A context-aware search system for Internet of Things based on hierarchical context model

In recent years, numerous sensing devices and wireless networks are immersed into our living environments, creating the Internet of Things (IoT) integrating the cyber and physical objects. Searching for objects in IoT is a challenging problem because the context relationships among IoT objects are various and complex. The traditional web search approaches cannot work well in the IoT search doma...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Network and Computer Applications

سال: 2022

ISSN: ['1084-8045', '1095-8592']

DOI: https://doi.org/10.1016/j.jnca.2021.103271