این رویداد خاتمه یافته است و اطلاعات موجود در این سایت صرفا جنبه آرشیو دارد
پنجمين دوره كنفرانس بین‌المللی اينترنت اشيا و كاربردها
The 5th International Conference on Internet of Things and Its Application

:: A Decentralized Method for Detecting Clone ID Attacks on the Internet of Things


A Decentralized Method for Detecting Clone ID Attacks on the Internet of Things

 

Saeid Rafiei Taghanaki

Faculty of Computer Engineering

University of Isfahan, Isfahan, Iran

Rafiei.saeid@yahoo.com

Shohreh Behnam Arzandeh

Department of Information

Technology Management,

SRBIAU,Tehran,Iran

shohreh.arzandeh@srbiau.ac.ir

Ali Bohlooli

Faculty of Computer Engineering

University of Isfahan, Isfahan, Iran

bohlooli@eng.ui.ac.ir

 

AbstractOne of the attacks in the RPL protocol is the Clone ID attack, that the attacker clones the node's ID in the network. In this research, a Clone ID detection system is designed for the Internet of Things (IoT), implemented in Contiki operating system, and evaluated using the Cooja emulator. Our evaluation shows that the proposed method has desirable performance in terms of energy consumption overhead, true positive rate, and detection speed. The overhead cost of the proposed method is low enough that it can be deployed in limited-resource nodes. The proposed method in each node has two phases, which are the steps of gathering information and attack detection. In the proposed scheme, each node detects this type of attack using control packets received from its neighbors and their information such as IP, rank, Path ETX, and RSSI, as well as the use of a routing table. The design of this system will contribute to the security of the IoT network.

 

Keywords: IOT; 6LowPAN; RPL; Security; Clone ID Attack

 






فایل‌های مورد نیاز

فراخوان ویژه

پوستر همایش

© کلیه حقوق این وب سایت محفوظ می باشد .
طراحی و پیاده سازی شده توسط : همایش نگار ( ویرایش 10.0.4)