Wormhole attack detection in internet of things

  • Authors

    • Mrs. Sneha Deshmukh Bhosale
    • Dr S. S. Sonavane
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.15488
  • Internet of Things, Security Attacks, Wormhole Attack, IDS.
  • Number of devices connected to the internet will increase in near future because of more applications arising in Internet of Things (IoT). These devices are resource constrained in terms of battery and processing power hence inserting security in constrained devices is going to be very challenging. There are many attacks taking place in Internet of Things like wormhole attack, sinkhole attack, hello flooding attack, cybil and clone ID attack etc. In this paper we are proposing a method to identify the wormhole attack taking place at routing layer of IoT. Wormhole attack is one such attack that has been recently discovered. Wormhole attack is a very severe and challenging attack because of the fact that it can be launched against any protocol and also due to its ability to be effective in case of encrypted trafï¬c. Threats due to Wormhole attack are alterations in network, can cause failure of location dependent protocols, can penetrate wrong route/topology information into the network and defeating the purpose of routing algorithms. In this paper we are discussing various types of Intrusion Detection Systems available for IoT attacks. We have also proposed an Intrusion Detection System (IDS) for Wormhole Attack.

     


     
  • References

    1. [1] Hamid Bostani , Mansour Sheikhan, “Hybrid of anomaly-based and speciï¬cation-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach â€, 0140-3664/© 2016, Elsevier.

      [2] Ms. Snehal Deshmukh, Dr. S. S. Sonavane, “Security Protocols for Internet of Things: A Surveyâ€, ICNETS2, VIT University, Chennai, 2017, 978-1-5090-5913-3/17/$31.00_c 2017 IEEE.

      [3] David Airehrour, Jairo Gutierrez, Sayan Kumar Ray, “Secure Routing for Internet of Things: A Surveyâ€, Journal of Network and Computer Applications, 2016.

      [4] Johan Becker, “Intrusion Detection System Framework for Internet of Thingsâ€, Thesis submitted University of Gothenburg, Sweden 2017.

      [5] Shahid Raza, Linus Wallgren, and Thiemo Voigt. "SVELTE: Real-time intrusion detection in The Internet of Things.â€Ad hoc networks 11.8 (2013): 2661-2674.

      [6] Amrita Ghosal, Subir Halder, “A survey on energy efï¬cient intrusion detection in wireless sensor networksâ€, Journal of Ambient Intelligence and Smart Environments 9 (2017) 239–261, DOI 10.3233/AIS-170426

      [7] Marianne Azer, Sherif El-Kassas, Magdy El-Soudani, “A full of the Wormhole Attackâ€, International Journal of Computer Science and Information Security, 2009.

      [8] Weekly, Kevin, and Kristofer Pister."Evaluating sinkhole defence techniques in RPL networks." Network Protocols (ICNP), 2012 20th IEEE International Conference on. IEEE, 2012.

  • Downloads

  • How to Cite

    Sneha Deshmukh Bhosale, M., & S. S. Sonavane, D. (2018). Wormhole attack detection in internet of things. International Journal of Engineering & Technology, 7(2.33), 749-751. https://doi.org/10.14419/ijet.v7i2.33.15488