A context-aware information-based clone node attack detection scheme in Internet of Things
نویسندگان
چکیده
The rapidly expanding nature of the Internet Things (IoT) networks is beginning to attract interest across a range applications, including smart homes, transportation, health, and industrial contexts such as robotics. This cutting-edge technology enables individuals track control their integrated environment in real-time remotely via thousands IoT devices comprised sensors actuators that actively participate sensing, processing, storing sharing information. Nonetheless, are frequently deployed hostile environments, wherein adversaries attempt capture them order seize entire network. One example potentially malicious behaviour cloning devices, which an attacker can physically obtain some sensitive information, duplicate intelligently deploy desired locations conduct various insider attacks. A device attack on significant security concern since it allows for selective forwarding, sink-hole, black-hole, warm-hole To address this issue, paper provides efficient scheme detecting clone node mobile uses semantic information known context locate securely. We design location proof mechanism by combining proofs batch verification extended elliptic curve digital signature technique (ECDSA*) accelerate process at selected trusted nodes. Furthermore, we present model selecting trustworthy based profile capabilities, enabling be chosen from other proof-verification procedure. Compared with existing studies, performance analysis experimental results suggest our proposed high degree detection accuracy minimal time significantly reduces computation, communication, energy storage overheads.
منابع مشابه
Clone Attack Detection in MWSN Using Neighbor Node Information
Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate no...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملModeling a Smart Hospital Information Architecture Based on Internet of Things and Recommender Agent
Introduction: Today, healthcare organizations worldwide are aware of the significance of technology and its impact on the quality of care. Hospitals are one of the most crucial systems in which the utilization of information is particularly important for several reasons. Using discrete-event simulation and developing a recommender agent, this study aimed to allocate IoT devices to patients in s...
متن کاملA context-aware search system for Internet of Things based on hierarchical context model
In recent years, numerous sensing devices and wireless networks are immersed into our living environments, creating the Internet of Things (IoT) integrating the cyber and physical objects. Searching for objects in IoT is a challenging problem because the context relationships among IoT objects are various and complex. The traditional web search approaches cannot work well in the IoT search doma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Network and Computer Applications
سال: 2022
ISSN: ['1084-8045', '1095-8592']
DOI: https://doi.org/10.1016/j.jnca.2021.103271