InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN

Internet of Things (IoT), an emerging Internet based technical architecture where heterogeneous sensors collaborate for ubiquitous computing based on several technologies and standard communication protocols. With, such an amount of scaling and diverse technologies involved, IoT is susceptible to various threats. Hence, devising an IoT system, providing security through resistance against attacks is a de facto requirement to make IoT secure and operational. The existing works for detecting adversaries like SVELTE and INTI consume too much resource. Further, packet dropping ratio is high and number of nodes taken for evaluation is low with some critical metrics overlooked. A novel detection technique with constraint based specification is proposed in this paper which significantly improves the shortcomings of SVELTE and INTI. The effectiveness of proposed scheme is valuated through comparative analysis using NS-2 simulation tool.

[1]  Ing-Ray Chen,et al.  A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..

[2]  Latif Ladid,et al.  Challenges of the Internet of Things: IPv6 and Network Management , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[3]  Ing-Ray Chen,et al.  Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.

[4]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[5]  Michele Nogueira Lima,et al.  Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[6]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[7]  Muhammad Ali,et al.  Secure Actor Directed Localization in Wireless Sensor and Actor Networks , 2013, Int. J. Distributed Sens. Networks.

[8]  Jonathan Loo,et al.  Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).

[9]  Maurizio A. Spirito,et al.  Denial-of-Service detection in 6LoWPAN based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[10]  Shafiullah Khan,et al.  Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.

[11]  Ingrid Moerman,et al.  IETF Standardization in the Field of the Internet of Things (IoT): A Survey , 2013, J. Sens. Actuator Networks.

[12]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[13]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[14]  Gabriel Montenegro,et al.  IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.

[15]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.