基于模糊人工蜂群的物联网RPL中Sybil攻击建模与检测

S. Hashemi
{"title":"基于模糊人工蜂群的物联网RPL中Sybil攻击建模与检测","authors":"S. Hashemi","doi":"10.2174/2210327913666230102120254","DOIUrl":null,"url":null,"abstract":"\n\nB IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things.\n\n\n\nModeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things.\n\n\n\nIn step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing.\n\n\n\nThe proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks.\n\n\n\nThe results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.\n","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"6 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Modeling and Detecting of Sybil Attacks in RPL for IoT Based on Fuzzy Artificial Bee Colony\",\"authors\":\"S. Hashemi\",\"doi\":\"10.2174/2210327913666230102120254\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n\\nB IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things.\\n\\n\\n\\nModeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things.\\n\\n\\n\\nIn step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing.\\n\\n\\n\\nThe proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks.\\n\\n\\n\\nThe results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.\\n\",\"PeriodicalId\":37686,\"journal\":{\"name\":\"International Journal of Sensors, Wireless Communications and Control\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Sensors, Wireless Communications and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2174/2210327913666230102120254\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Sensors, Wireless Communications and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/2210327913666230102120254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

摘要

基于ipv6的低功耗有损网络(lln)是物联网(IoT)的主要推动者之一。IPv6 RPL (Routing Protocol for Low-Power and Lossy Networks)是一种面向lln的路由协议。RPL由于缺乏特定的安全模型和资源的有限性,容易受到各种安全攻击。最具破坏性的袭击之一是西比尔袭击。在西比尔的攻击中,一个恶意的东西声称了多个非法身份。这种攻击的目标是耗尽合法事物的有限能量资源。模拟物联网环境中的Sybil攻击,以及检测和减轻恶意事物。在第一步中,我们提出了一种基于Sybil攻击建模的模糊人工蜂群(FABC)。在第二步中,我们提出了一个轻量级的对策来有效地检测和减轻Sybil恶意的东西。该方法在Contiki Cooja中进行了仿真。该方法的平均准确度、灵敏度和特异性分别超过94%、93%和85%。除了准确性、灵敏度、特异性和F-score外,该方法还通过分组投递率和能量消耗标准进行了评估,结果令人满意。结果表明,该方法可以提高基于Sybil攻击检测的物联网RPL协议的安全性。结果表明,该方法除了具有较高的攻击检测精度外,还可以通过高效的攻击检测来避免能源的浪费。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Modeling and Detecting of Sybil Attacks in RPL for IoT Based on Fuzzy Artificial Bee Colony
B IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things. Modeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things. In step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing. The proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks. The results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Sensors, Wireless Communications and Control
International Journal of Sensors, Wireless Communications and Control Engineering-Electrical and Electronic Engineering
CiteScore
2.20
自引率
0.00%
发文量
53
期刊介绍: International Journal of Sensors, Wireless Communications and Control publishes timely research articles, full-length/ mini reviews and communications on these three strongly related areas, with emphasis on networked control systems whose sensors are interconnected via wireless communication networks. The emergence of high speed wireless network technologies allows a cluster of devices to be linked together economically to form a distributed system. Wireless communication is playing an increasingly important role in such distributed systems. Transmitting sensor measurements and control commands over wireless links allows rapid deployment, flexible installation, fully mobile operation and prevents the cable wear and tear problem in industrial automation, healthcare and environmental assessment. Wireless networked systems has raised and continues to raise fundamental challenges in the fields of science, engineering and industrial applications, hence, more new modelling techniques, problem formulations and solutions are required.
期刊最新文献
Non-orthogonal Multiple Access (NOMA) Channel Estimation for Mobile & PLC-VLC Based Broadband Communication System Optimizing Financial Decision Support Systems with Machine LearningDriven Recommendations An Energy-Balance Clustering Routing Protocol for Intra-Body Wireless Nanosensor Networks Unveiling Data Fairness Functional Requirements in Big Data Analytics Through Data Mapping and Classification Analysis An Intelligent Transport System Using Vehicular Network for Smart Cities
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1