采用键控哈希算法、顺序概率比测试和温度比较测试作为物联网wsn节点捕获攻击的安全防护

Q3 Engineering Journal of Communications Pub Date : 2021-01-01 DOI:10.12720/jcm.16.11.500-507
Jhon Aron F. Varca, Earl Nestor T. Velasquez, Joseph Bryan G. Ibarra
{"title":"采用键控哈希算法、顺序概率比测试和温度比较测试作为物联网wsn节点捕获攻击的安全防护","authors":"Jhon Aron F. Varca, Earl Nestor T. Velasquez, Joseph Bryan G. Ibarra","doi":"10.12720/jcm.16.11.500-507","DOIUrl":null,"url":null,"abstract":"The emergence of IoT opened new opportunities for development in various fields. With all the information that it gathers, it became an interesting target for multiple attackers. Thus, this study will enforce security solutions to IoT-based devices specifically in the perception layer by incorporating a Temperature Comparison Test, Keyed Hash Algorithm and evaluating it using SPRT especially in the defense against malicious activities detected in the nodes of a network namely for Mobile and Immobile attacks. For immobile attacks, using the keyed hash algorithm and the SPRT, the hash key of the passcodes was compared to determine the safety of the nodes. Hence, from the functionality test that was conducted, and evaluating the data gathered using SPRT and Bernoulli’s equation, the reliability of the protocol to detect Immobile attacks is concluded to have a 100% detection rate. For mobile node attacks, the study assumes the environment to be under normal, warm, and cold room temperatures. where both mobile and without mobile attack is simulated, the result shows that there is only an overall 3% difference from the temperature measure by the sensor to the ambient temperature. Hence, combining these protocols that are applied in the study eliminates the single points of failure in the nodes that are either applicable only to a distributed scheme or mobility support, the study also compared the tested protocol to the other existing protocols.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"16 1","pages":"500-507"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Employing Keyed Hash Algorithm, Sequential Probability Ratio Test, and Temperature Comparison Test as Security Against Node Capture Attacks of IoT-Based WSNs\",\"authors\":\"Jhon Aron F. Varca, Earl Nestor T. Velasquez, Joseph Bryan G. Ibarra\",\"doi\":\"10.12720/jcm.16.11.500-507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emergence of IoT opened new opportunities for development in various fields. With all the information that it gathers, it became an interesting target for multiple attackers. Thus, this study will enforce security solutions to IoT-based devices specifically in the perception layer by incorporating a Temperature Comparison Test, Keyed Hash Algorithm and evaluating it using SPRT especially in the defense against malicious activities detected in the nodes of a network namely for Mobile and Immobile attacks. For immobile attacks, using the keyed hash algorithm and the SPRT, the hash key of the passcodes was compared to determine the safety of the nodes. Hence, from the functionality test that was conducted, and evaluating the data gathered using SPRT and Bernoulli’s equation, the reliability of the protocol to detect Immobile attacks is concluded to have a 100% detection rate. For mobile node attacks, the study assumes the environment to be under normal, warm, and cold room temperatures. where both mobile and without mobile attack is simulated, the result shows that there is only an overall 3% difference from the temperature measure by the sensor to the ambient temperature. Hence, combining these protocols that are applied in the study eliminates the single points of failure in the nodes that are either applicable only to a distributed scheme or mobility support, the study also compared the tested protocol to the other existing protocols.\",\"PeriodicalId\":53518,\"journal\":{\"name\":\"Journal of Communications\",\"volume\":\"16 1\",\"pages\":\"500-507\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12720/jcm.16.11.500-507\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12720/jcm.16.11.500-507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

物联网的出现为各个领域的发展带来了新的机遇。有了它收集的所有信息,它成为了多个攻击者的一个有趣的目标。因此,本研究将对基于物联网的设备实施安全解决方案,特别是在感知层,通过结合温度比较测试、密钥哈希算法并使用SPRT评估它,特别是在防御网络节点中检测到的恶意活动时,即针对移动和非移动攻击。对于不可移动攻击,使用键控哈希算法和SPRT,比较密码的哈希密钥,以确定节点的安全性。因此,通过所进行的功能测试,并对SPRT和伯努利方程收集的数据进行评估,可以得出协议检测Immobile攻击的可靠性为100%。对于移动节点攻击,本研究假设环境在正常、温暖和寒冷的室温下。在模拟移动攻击和非移动攻击的情况下,结果表明,传感器测量的温度与环境温度之间只有3%的总体差异。因此,结合研究中应用的这些协议,消除了仅适用于分布式方案或移动性支持的节点中的单点故障,研究还将测试的协议与其他现有协议进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Employing Keyed Hash Algorithm, Sequential Probability Ratio Test, and Temperature Comparison Test as Security Against Node Capture Attacks of IoT-Based WSNs
The emergence of IoT opened new opportunities for development in various fields. With all the information that it gathers, it became an interesting target for multiple attackers. Thus, this study will enforce security solutions to IoT-based devices specifically in the perception layer by incorporating a Temperature Comparison Test, Keyed Hash Algorithm and evaluating it using SPRT especially in the defense against malicious activities detected in the nodes of a network namely for Mobile and Immobile attacks. For immobile attacks, using the keyed hash algorithm and the SPRT, the hash key of the passcodes was compared to determine the safety of the nodes. Hence, from the functionality test that was conducted, and evaluating the data gathered using SPRT and Bernoulli’s equation, the reliability of the protocol to detect Immobile attacks is concluded to have a 100% detection rate. For mobile node attacks, the study assumes the environment to be under normal, warm, and cold room temperatures. where both mobile and without mobile attack is simulated, the result shows that there is only an overall 3% difference from the temperature measure by the sensor to the ambient temperature. Hence, combining these protocols that are applied in the study eliminates the single points of failure in the nodes that are either applicable only to a distributed scheme or mobility support, the study also compared the tested protocol to the other existing protocols.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Communications
Journal of Communications Engineering-Electrical and Electronic Engineering
CiteScore
3.40
自引率
0.00%
发文量
29
期刊介绍: JCM is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, systems, methods, algorithms and applications in communications. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on communications. All papers will be blind reviewed and accepted papers will be published monthly which is available online (open access) and in printed version.
期刊最新文献
Spectral-Efficient Aircraft Pairing for Massive MIMO NOMA in Aeronautical Communication Routing Protocol against Flooding Attack Using Median Value and Fixed Threshold Reduction of OFDM PAPR Using a Combined Hadamard Transformation and Selective Mapping for Terrestrial DAB+ System under Rayleigh and AWGN Channel Please Use a three-wire Watch a Novel Protocol Designed for Addressing Hidden and Exposed Layer Issues in the Medium Access Control Layer of Mobile Adhoc Network The Comparison of Dry Hydrostatic Delay Measurement from GPS Ground-Based and Space- Based Receiver
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1