Proposing a Behavior-Based IDS Model for IoT Environment

In the 21th century, Internet of Things (IoT) is considered an important topic into Information Communication and Technology due to massive revenue and uses in several fields. It has several communication protocols, multiple technologies implemented into its objects, also interactions between IoT applications and users depends on Wireless Sensor Networks technology (WSN). Therefore, improving IoT depends on developing the WSN. WSN is based on spread nodes that are connected with several sensors in order to collect and share information to provide its functionalities. However, there are several threats, vulnerabilities and attacks that affect functionality of WSN. These kind of attacks is considered sophisticated and very difficult to discover and detect. Therefore, there is the need to measure WSN behavior in order to indicate abnormal behavior and classify it as an attack. In this paper, we proposed a model to measure WSN behavior based on attacks effects. Also, this model consists of metrics in order to define a security architecture for Smart City Comprising Intrusion Detection mechanism to detect major attacks.

[1]  Helena Rifà-Pous,et al.  Attack Classification Schema for Smart City WSNs , 2017, Sensors.

[2]  Liu Yong-Min,et al.  The Architecture and Characteristics of Wireless Sensor Network , 2009, 2009 International Conference on Computer Technology and Development.

[3]  Nisha S. Raote Defending Wormhole Attack in Wireless Ad-hoc Network , 2011 .

[4]  Said Bouchkaren,et al.  6lo Technology for Smart Cities Development:Security Case Study , 2014 .

[5]  Parminder Singh,et al.  Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WSNs during Wormhole Attack , 2014 .

[6]  Shahriar Mohammadi,et al.  A Comparison of Physical Attacks on Wireless Sensor Networks , 2011 .

[7]  Samy El-Tawab,et al.  IoT security attacks using reverse engineering methods on WSN applications , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[8]  Venkatachalam Subramanian Proximity-based attacks in wireless sensor networks , 2013 .

[9]  Punit Sharma,et al.  A Taxonomy of Physical Layer Attacks in MANET , 2015 .

[10]  Abdul Hanan Abdullah,et al.  Security Issues and Attacks in Wireless Sensor Network , 2014 .

[11]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[12]  Hüseyin Arslan,et al.  A survey: Spoofing attacks in physical layer security , 2015, 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops).

[13]  Zeljko Hocenski,et al.  Network performance evaluation of latest windows operating systems , 2012, SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks.

[14]  Monika Sachdeva,et al.  Detection of Hello Flood Attack on LEACH in Wireless Sensor Networks , 2018 .

[15]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[16]  Martine Bellaïche,et al.  A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing , 2017, Future Internet.

[17]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[18]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[19]  Reza Ebrahimi Atani,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.

[20]  Akshai Aggarwal,et al.  Wormhole Attacks and Countermeasures in Wireless Sensor Networks : A Survey , 2017 .

[21]  Debashis De,et al.  Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.

[22]  Teodor-Grigore Lupu,et al.  Main types of attacks in wireless sensor networks , 2009 .

[23]  Naser Alajmi,et al.  Wireless Sensor Networks Attacks and Solutions , 2014, ArXiv.

[24]  Goran Martinović,et al.  Quality of Service in Wireless Sensor Networks: A Survey and Related Patents , 2011 .

[25]  Pavel Loskot,et al.  Common Metrics for Analyzing, Developing and Managing Telecommunication Networks , 2017, ArXiv.

[26]  Pavan Pongle,et al.  Real Time Intrusion and Wormhole Attack Detection in Internet of Things , 2015 .

[27]  Vishnu Pratap Singh Kirar A Survey of Attacks and Security Requirements in Wireless Sensor Networks , 2015 .

[28]  Pablo Sanchez,et al.  Simulation of Attacks for Security in Wireless Sensor Network , 2016, Sensors.

[29]  Maruf Pasha,et al.  A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures , 2017, ArXiv.

[30]  Vasco Pereira Performance Measurement in Wireless Sensor Networks , 2016 .