An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)

IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE PeerJ Computer Science Pub Date : 2024-08-09 DOI:10.7717/peerj-cs.2231
Muhammad Zunnurain Hussain, Zurina Mohd Hanapi, Azizol Abdullah, Masnida Hussin, Mohd Izuan Hafez Ninggal
{"title":"An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)","authors":"Muhammad Zunnurain Hussain, Zurina Mohd Hanapi, Azizol Abdullah, Masnida Hussin, Mohd Izuan Hafez Ninggal","doi":"10.7717/peerj-cs.2231","DOIUrl":null,"url":null,"abstract":"In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. Using such a new way of calculating node reliability, we introduce a cutting-edge approach, evaluating parameters beyond routing metrics like energy conservation and actuality. SF-MRTS works precisely towards achieving a trusted network by introducing such trust metrics on secure paths. Therefore, this may be considered more likely to withstand the attacks because of these security improvements. The simulation function of SF-MRTS clearly shows its concordance with the security risk management features, which are also necessary for the network’s performance and stability maintenance. These mechanisms are based on the principles of game theory, and they allocate attractions to the nodes that cooperate while imposing penalties on the nodes that do not. This will be the way to avoid damage to the network, and it will lead to collaboration between the nodes. SF-MRTS is a security technology for emerging industrial Internet of Things (IoT) network attacks. It effectively guaranteed reliability and improved the networks’ resilience in different scenarios.","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"20 1","pages":""},"PeriodicalIF":2.5000,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"PeerJ Computer Science","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.7717/peerj-cs.2231","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0

Abstract

In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. Using such a new way of calculating node reliability, we introduce a cutting-edge approach, evaluating parameters beyond routing metrics like energy conservation and actuality. SF-MRTS works precisely towards achieving a trusted network by introducing such trust metrics on secure paths. Therefore, this may be considered more likely to withstand the attacks because of these security improvements. The simulation function of SF-MRTS clearly shows its concordance with the security risk management features, which are also necessary for the network’s performance and stability maintenance. These mechanisms are based on the principles of game theory, and they allocate attractions to the nodes that cooperate while imposing penalties on the nodes that do not. This will be the way to avoid damage to the network, and it will lead to collaboration between the nodes. SF-MRTS is a security technology for emerging industrial Internet of Things (IoT) network attacks. It effectively guaranteed reliability and improved the networks’ resilience in different scenarios.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于信任的高效安全和能量弹性系统,用于检测和缓解sybil攻击检测(SAN)
在充斥着近乎无穷无尽的网络安全隐患的现代数字市场中,精密的 IDS(入侵检测系统)在抵御错综复杂的安全威胁方面具有不可估量的作用。无假手于人(Sybil-Free Metric-based Routing Protocol for Low Power and Lossy Network (RPL) Trustworthiness Scheme,简称 SF-MRTS)抓住了 RPL 模块下低功耗和有损网络路由协议面临的最大威胁(即假手于人攻击)的本质。Sybil攻击是RPL网络面临的一个重大安全挑战,攻击者可以扭曲至少两跳路径并破坏网络进程。利用这种计算节点可靠性的新方法,我们引入了一种前沿方法,对能量守恒和实际性等路由指标以外的参数进行评估。SF-MRTS 正是通过在安全路径上引入此类信任指标来实现可信网络。因此,由于这些安全方面的改进,这可能被认为更有可能抵御攻击。SF-MRTS 的仿真功能清楚地显示了它与安全风险管理功能的一致性,这也是网络性能和稳定性维护所必需的。这些机制基于博弈论原理,对合作的节点分配吸引力,对不合作的节点实施惩罚。这将是避免对网络造成破坏的方法,也将促成节点之间的合作。SF-MRTS 是一种针对新兴工业物联网(IoT)网络攻击的安全技术。它有效保证了不同场景下网络的可靠性,提高了网络的弹性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
PeerJ Computer Science
PeerJ Computer Science Computer Science-General Computer Science
CiteScore
6.10
自引率
5.30%
发文量
332
审稿时长
10 weeks
期刊介绍: PeerJ Computer Science is the new open access journal covering all subject areas in computer science, with the backing of a prestigious advisory board and more than 300 academic editors.
期刊最新文献
A new era in identification of tick genera; artificial intelligence for precision and speed. MS-YieldStackNet: multi-source data fusion for wheat yield estimation using a stacked ensemble neural network. A hybrid algorithmic model for enhancing security in intelligent reflecting surface-assisted wireless communication. Robust coffee plant disease classification using deep learning and advanced feature engineering techniques. KomoTrip: a multi-day travel itinerary recommendation method based on the discrete komodo mlipir algorithm.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1