CFP last date
20 December 2024
Reseach Article

Real Time Intrusion and Wormhole Attack Detection in Internet of Things

by Pavan Pongle, Gurunath Chavan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 9
Year of Publication: 2015
Authors: Pavan Pongle, Gurunath Chavan
10.5120/21565-4589

Pavan Pongle, Gurunath Chavan . Real Time Intrusion and Wormhole Attack Detection in Internet of Things. International Journal of Computer Applications. 121, 9 ( July 2015), 1-9. DOI=10.5120/21565-4589

@article{ 10.5120/21565-4589,
author = { Pavan Pongle, Gurunath Chavan },
title = { Real Time Intrusion and Wormhole Attack Detection in Internet of Things },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 9 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number9/21565-4589/ },
doi = { 10.5120/21565-4589 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:07:58.328811+05:30
%A Pavan Pongle
%A Gurunath Chavan
%T Real Time Intrusion and Wormhole Attack Detection in Internet of Things
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 9
%P 1-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There are currently more objects connected to the Internet than people in the world. This gap will continue to grow, as more objects gain the ability to directly interface with the Internet. Providing security in IoT is challenging as the devices are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies such as RPL and 6LoWPAN. Due to this it is easy to attack in IoT network. The proposed system is a novel intrusion detection system for the IoT, which is capable of detecting Wormhole attack and attacker. The proposed methods uses the location information of node and neighbor information to identify the Wormhole attack and received signal strength to identify attacker nodes. Design of such system will help in securing the IoT network and may prevents such attacks. This method is very energy efficient and only takes fixed number of UDP packets for attack detection, hence it is beneficial for resource constrained environment.

References
  1. IETF, RPL. "Routing Over Low Power and Lossy Networks. "
  2. Wallgren, Linus, Shahid Raza, and Thiemo Voigt. "Routing Attacks and Countermeasures in the RPL-based Internet of Things. " International Journal of Distributed Sensor Networks 2013, 2013.
  3. Song N, Qian L, Li X, "Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach", Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International,vol. , no. , pp. 8 pp. , 4-8 April 2005.
  4. H. S. Chiu and K. Lui, "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks",In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.
  5. L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks", Proc. Symp. Netw. Distrib. Syst. Security, 2004
  6. Dhurandher, Sanjay Kumar, et al. , "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks. ", Advanced Information Networking and Applications Workshops (WAINA), 2012 26th International Conference on. IEEE, 2012
  7. Raju, V. Karthik, and K. Vinay Kumar, "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks In Mobile Ad Hoc Networks", Computing Sciences (ICCS), 2012 International Conference on. IEEE, 2012.
  8. Yifeng Zhou , Lamont L , Li Li,"Wormhole attack detection based on distance verification and the Use of hypothesis testing for wireless ad hoc networks", Military Communications Conference, MILCOM IEEE, 2009
  9. Pavan Pongle, Gurunath Chavan, "A survey: Attacks on RPL and 6LoWPAN in IoT ", International Conference on Pervasive Computing (ICPC) IEEE, 2015
  10. Amin, Syed Obaid, et al. "A novel coding scheme to implement signature based IDS in IP based Sensor Networks. " Integrated Network Management-Workshops, 2009. IM'09. IFIP/IEEE International Symposium on. IEEE, 2009.
  11. Kasinathan, Prabhakaran, et al. "Denial-of-Service detection in 6LoWPAN based internet of things. " Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on. IEEE, 2013.
  12. Le, Anhtuan, et al. "Specification-based IDS for securing RPL from topology attacks. " Wireless Days (WD), 2011 IFIP. IEEE, 2011.
  13. Raza, Shahid, Linus Wallgren, and Thiemo Voigt. "SVELTE: Real-time intrusion detection in the Internet of Things. " Ad hoc networks 11. 8 (2013): 2661-2674.
  14. Jun, Chen, and Chen Chi. "Design of Complex Event- Processing IDS in Internet of Things. " Measuring Technology and Mechatronics Automation (ICMTMA), 2014 Sixth International Conference on. IEEE, 2014.
  15. A. Dunkels, J. Eriksson, N. Finne, N. Tsiftes, Powertrace: NetworkLevel Power Profiling for Low-Power Wireless Networks, 2011.
  16. http://www. eecs. harvard. edu/˜konrad/projects/shimmer /references/tmote-sky-datasheet. pdf
  17. Le, Anhtuan, et al. "The impacts of internal threats towards Routing Protocol for Low power and lossy network performance. " Computers and Communications (ISCC), 2013 IEEE Symposium on. IEEE, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion Detection Internet of Things RPL Wormhole Packet Relay Encapsulation RSSI