{"title":"基于模糊人工蜂群的物联网RPL中Sybil攻击建模与检测","authors":"S. Hashemi","doi":"10.2174/2210327913666230102120254","DOIUrl":null,"url":null,"abstract":"\n\nB IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things.\n\n\n\nModeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things.\n\n\n\nIn step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing.\n\n\n\nThe proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks.\n\n\n\nThe results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.\n","PeriodicalId":37686,"journal":{"name":"International Journal of Sensors, Wireless Communications and Control","volume":"6 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Modeling and Detecting of Sybil Attacks in RPL for IoT Based on Fuzzy Artificial Bee Colony\",\"authors\":\"S. Hashemi\",\"doi\":\"10.2174/2210327913666230102120254\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\n\\nB IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things.\\n\\n\\n\\nModeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things.\\n\\n\\n\\nIn step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing.\\n\\n\\n\\nThe proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks.\\n\\n\\n\\nThe results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.\\n\",\"PeriodicalId\":37686,\"journal\":{\"name\":\"International Journal of Sensors, Wireless Communications and Control\",\"volume\":\"6 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Sensors, Wireless Communications and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2174/2210327913666230102120254\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Sensors, Wireless Communications and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2174/2210327913666230102120254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0
摘要
基于ipv6的低功耗有损网络(lln)是物联网(IoT)的主要推动者之一。IPv6 RPL (Routing Protocol for Low-Power and Lossy Networks)是一种面向lln的路由协议。RPL由于缺乏特定的安全模型和资源的有限性,容易受到各种安全攻击。最具破坏性的袭击之一是西比尔袭击。在西比尔的攻击中,一个恶意的东西声称了多个非法身份。这种攻击的目标是耗尽合法事物的有限能量资源。模拟物联网环境中的Sybil攻击,以及检测和减轻恶意事物。在第一步中,我们提出了一种基于Sybil攻击建模的模糊人工蜂群(FABC)。在第二步中,我们提出了一个轻量级的对策来有效地检测和减轻Sybil恶意的东西。该方法在Contiki Cooja中进行了仿真。该方法的平均准确度、灵敏度和特异性分别超过94%、93%和85%。除了准确性、灵敏度、特异性和F-score外,该方法还通过分组投递率和能量消耗标准进行了评估,结果令人满意。结果表明,该方法可以提高基于Sybil攻击检测的物联网RPL协议的安全性。结果表明,该方法除了具有较高的攻击检测精度外,还可以通过高效的攻击检测来避免能源的浪费。
Modeling and Detecting of Sybil Attacks in RPL for IoT Based on Fuzzy Artificial Bee Colony
B IPv6-based low-power and lossy networks (LLNs) are one of the major enablers for the Internet of Things (IoT). IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is proposed and standardized as a routing protocol for LLNs. RPL is vulnerable to various security attacks because of the lack of specific security models and its resource-constrained nature. One of the most destructive attacks is the Sybil attack. In a Sybil attack, a malicious thing claims multiple illegitimate identities. The target of this attack is to deplete the limited energy resource of legitimate things.
Modeling the Sybil attack in the IoT environment as well as detecting and mitigating malicious things.
In step one, we propose a fuzzy artificial bee colony (FABC) based on Sybil attack modeling. In step two, we propose a lightweight countermeasure to effectively detect and mitigate the Sybil malicious thing.
The proposed method is simulated in Contiki Cooja. The average accuracy, sensitivity, and specificity of the proposed method are more than 94%, 93%, and 85%, respectively. In addition to accuracy, sensitivity, specificity, and F-score, the proposed method was also evaluated with packet delivery ratio and energy consumption criteria and presents desirable results. The results show that the proposed approach can improve security in the RPL protocol for the IoT based on the detection of Sybil attacks.
The results show that the proposed method, in addition to having high accuracy in detecting attacks, prevents the wastage of energy resources by efficient detection of attacks.
期刊介绍:
International Journal of Sensors, Wireless Communications and Control publishes timely research articles, full-length/ mini reviews and communications on these three strongly related areas, with emphasis on networked control systems whose sensors are interconnected via wireless communication networks. The emergence of high speed wireless network technologies allows a cluster of devices to be linked together economically to form a distributed system. Wireless communication is playing an increasingly important role in such distributed systems. Transmitting sensor measurements and control commands over wireless links allows rapid deployment, flexible installation, fully mobile operation and prevents the cable wear and tear problem in industrial automation, healthcare and environmental assessment. Wireless networked systems has raised and continues to raise fundamental challenges in the fields of science, engineering and industrial applications, hence, more new modelling techniques, problem formulations and solutions are required.