Impacts & Detection of Network Layer Attacks on IoT Networks

With the advent of the Internet of Things (IoT), wireless sensor and actuator networks, subsequently referred to as IoT networks (IoTNs), are proliferating at an unprecedented rate in several newfound areas such as smart cities, health care, and transportation, and consequently, securing them is of paramount importance. In this paper, we present several useful insights from an exploratory study of the impacts of network layer attacks on IoTNs. We envision that these insights will guide the design of future frameworks to defend against network layer attacks. We also present a preliminary such framework and demonstrate its effectiveness in detecting network layer attacks through experiments on a real IoTN test-bed.

[1]  Udo W. Pooch,et al.  Zone-Based Intrusion Detection for Mobile Ad Hoc Networks , 2006, Ad Hoc Sens. Wirel. Networks.

[2]  Yang Xiang,et al.  Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2011 .

[3]  Philippe Jacquet,et al.  OLSR performance measurement in a military mobile ad-hoc network , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[4]  H. Zimmermann,et al.  OSI Reference Model - The ISO Model of Architecture for Open Systems Interconnection , 1980, IEEE Transactions on Communications.

[5]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[6]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[7]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[8]  Gregory A. Hansen,et al.  The Optimized Link State Routing Protocol , 2003 .

[9]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[10]  Y.A. Sekercioglu,et al.  Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.

[11]  Nei Kato,et al.  Analysis of the node isolation attack against OLSR-based mobile ad hoc networks , 2006, 2006 International Symposium on Computer Networks.

[12]  Bharat K. Bhargava,et al.  Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[13]  Min Song,et al.  Intrusion detection of sinkhole attacks in large-scale wireless sensor networks , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[14]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.