NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things

Internet of Things (IoTs) is a new concept in computer science that connects the objects with limited resources to unreliable internet through different technologies. The fundamental components of IoT (e.g., the wireless sensor networks and the internet) have an unsecured foundation that leads to different vulnerabilities such as vulnerability against a blackhole attack. In a blackhole attack, the attacker fakes itself as the shortest path to the destination, which is a node here. This causes the routing packets to not reach the destination. In this study, we offer a novel intelligent agent-based strategy using the hello packet table (NIASHPT) to deal with these problems by discovering the blackhole attacks. The proposed NIASHPT method provides an intrusion detection system scheme to defend against blackhole attacks and reduce or eliminate such attacks. This method consists of three phases: In the first phase, each node listens to its adjacent nodes and then applies a pre-routing process. In the stages of adjacent node listening and pre-routing, we attempt to find the blackhole attacks. In the second phase of the proposed method, the malicious nodes are detected and separated from the IoT network to avoid emerging attacks along the route from the source to the destination. In the third phase, the selected route from the source to the destination is checked. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the NIASHPT method can achieve a false positive rate of 19.453%, a false negative rate of 22.19%, a detection rate of 80.5%, a PDR of 89.56%, and a packet loss rate of 10.04% in the case of launching a blackhole attack.

[1]  N. Bhalaji,et al.  A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol , 2019, ICICCT - 2019.

[2]  Reza Fotohi,et al.  An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System , 2020, ArXiv.

[3]  Reza Fotohi,et al.  Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system , 2020, Reliab. Eng. Syst. Saf..

[4]  Shahram Jamali,et al.  An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .

[5]  Jamali Shahram,et al.  A Hybrid Routing Method for Mobile ad-hoc Networks , 2016 .

[6]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[7]  Daniele Miorandi,et al.  REATO: REActing TO Denial of Service attacks in the Internet of Things , 2018, Comput. Networks.

[8]  Devesh C. Jinwala,et al.  Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).

[9]  Furkan Yusuf Yavuz,et al.  Deep Learning for Detection of Routing Attacks in the Internet of Things , 2018, Int. J. Comput. Intell. Syst..

[10]  Shahram Jamali,et al.  Improvement over the OLSR Routing Protocol in Mobile Ad Hoc Networks by Eliminating the Unnecessary Loops , 2013 .

[11]  Mauro Conti,et al.  SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things , 2018, 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[12]  Tao Qin,et al.  IMLADS: Intelligent Maintenance and Lightweight Anomaly Detection System for Internet of Things , 2019, Sensors.

[13]  Sayan Kumar Ray,et al.  A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks , 2017 .

[14]  G. Geethakumari,et al.  Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT , 2018, 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[15]  Chung-Horng Lung,et al.  Routing Attacks and Mitigation Methods for RPL-Based Internet of Things , 2019, IEEE Communications Surveys & Tutorials.

[16]  Ashutosh Sharma,et al.  A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology , 2019, Ad Hoc Networks.

[17]  Shahram Behzad,et al.  Defense Against the Attacks of the Black Hole , Gray Hole and Wormhole in MANETs Based on RTT and PFT , 2015 .

[18]  Shahram Jamali,et al.  A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks , 2014 .

[19]  Dan Deng,et al.  Intelligent Secure Communication for Internet of Things With Statistical Channel State Information of Attacker , 2019, IEEE Access.

[20]  Shahram Jamali,et al.  Defending against Wormhole Attack in MANET Using an Artificial Immune System , 2016 .

[21]  Houbing Song,et al.  Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures , 2019, IEEE Communications Surveys & Tutorials.

[22]  Reza Fotohi,et al.  A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network , 2020, International Journal of Advanced Computer Science and Applications.

[23]  Reza Fotohi,et al.  An Artificial Immune System based Method for Defense against Wormhole Attack in Mobile Adhoc Networks , 2018 .

[24]  Wenyuan Xu,et al.  Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks , 2019, 2019 Chinese Control Conference (CCC).

[25]  Cristina Alcaraz Security and Privacy Trends in the Industrial Internet of Things , 2019, Advanced Sciences and Technologies for Security Applications.

[26]  Shahram Behzad,et al.  An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks , 2018, J. Comput..

[27]  Isaac Woungang,et al.  T_CAFE: A Trust based Security approach for Opportunistic IoT , 2019, IET Commun..

[28]  Roger Woods,et al.  Physical Layer Security for the Internet of Things: Authentication and Key Generation , 2019, IEEE Wireless Communications.

[29]  Abdelkamel Tari,et al.  Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET , 2018, J. Inf. Secur. Appl..

[30]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[31]  Jiong Jin,et al.  Cyber security framework for Internet of Things-based Energy Internet , 2018, Future Gener. Comput. Syst..

[32]  Reza Fotohi,et al.  Securing Wireless Sensor Networks Against Denial‐of‐Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol , 2019, Int. J. Commun. Syst..

[33]  Ioannis Papaefstathiou,et al.  SCOTRES: Secure Routing for IoT and CPS , 2017, IEEE Internet of Things Journal.