scispace - formally typeset
Search or ask a question
Author

Leovigildo Sánchez-Casado

Bio: Leovigildo Sánchez-Casado is an academic researcher from University of Granada. The author has contributed to research in topics: Network packet & Network management. The author has an hindex of 6, co-authored 9 publications receiving 93 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This work introduces a model of data forwarding in MANETs which is used for recognizing malicious packet dropping behaviors and proposes an anomaly-based IDS system based on an enhanced windowing method to carry out the collection and analysis of selected cross-layer features.

27 citations

Journal ArticleDOI
TL;DR: This paper presents a novel approach intended to detect the well-known sinkhole attack in MANETs, one of the most representative route poisoning attacks aimed at exploiting multi-hop source-destination routes to seize communications.

20 citations

Book ChapterDOI
03 Sep 2013
TL;DR: The capabilities of NETA are exhibited by evaluating the performance of the three implemented attacks under different MANET deployments, and its flexible design is appropriate for the implementation and evaluation of many types of attacks.
Abstract: This work introduces NETA, a novel framework for the simulation of communication networks attacks. It is built on top of the INET framework and the OMNET++ simulator, using the generally accepted implementations of many different protocols, as well as models for mobility, battery consumption, channel errors, etc. NETA is intended to become an useful framework for researchers focused on the network security field. Its flexible design is appropriate for the implementation and evaluation of many types of attacks, doing it accurate for the benchmarking of current defense solutions under same testing conditions or for the development of new defense techniques. As a proof of concept, three different attacks have been implemented in NETA. The capabilities of NETA are exhibited by evaluating the performance of the three implemented attacks under different MANET deployments.

18 citations

Journal ArticleDOI
TL;DR: ADroid is a novel security tool for Android platforms with three main distinguishing characteristics: interfaces usage, application-related and communication-related features, and a lightweight anomaly-based detection procedure performed over these features in order to determine the occurrence of unexpected abnormal activities.
Abstract: As mobile devices become more and more adopted by users for daily personal and professional activities, associated security risks and impact to them also increase. Although there are a number of proposals aimed at fighting against such incidents, the topic still remains challenging. This paper presents ADroid, a novel security tool for Android platforms with three main distinguishing characteristics. First, three groups of features are monitored over time: interfaces usage, application-related and communication-related features. Second, a lightweight anomaly-based detection procedure is performed over these features in order to determine the occurrence of unexpected abnormal activities. Third, the user can also create specific white/black lists to indicate in an easy way certain allowed/undesired activities which, if so, should trigger an alarm by the supervision system. ADroid has been implemented in a real environment and evaluated through experimentation. The detection accuracy exhibited and the resources consumption involved in its operation show the goodness and promising capabilities of the system.

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey analyzes existing routing protocols and mechanisms to secure routing communications in IoT, as well as the open research issues and analyzes the open challenges and strategies for future research work for a better secure IoT routing.

253 citations

Journal ArticleDOI
TL;DR: A comparative analysis of existing simulation tools categorized based on the scope of coverage of the IoT architecture layers is presented, and existing large-scale IoT testbeds that have been adopted by researchers for examining the physical IoT prototypes are compared.
Abstract: The Internet of Things (IoT) vision is increasingly being realized to facilitate convenient and efficient human living. To conduct effective IoT research using the most appropriate tools and techniques, we discuss recent research trends in the IoT area along with current challenges faced by the IoT research community. Several existing and emerging IoT research areas such as lightweight energy-efficient protocol development, object cognition and intelligence, as well as the critical need for robust security and privacy mechanisms will continue to be significant fields of research for IoT. IoT research can be a challenging process spanning both virtual and physical domains through the use of simulators and testbeds to develop and validate the initial proof-of-concepts and subsequent prototypes. To support researchers in planning IoT research activities, we present a comparative analysis of existing simulation tools categorized based on the scope of coverage of the IoT architecture layers. We compare existing large-scale IoT testbeds that have been adopted by researchers for examining the physical IoT prototypes. Finally, we discuss several open challenges of current IoT simulators and testbeds that need to be addressed by the IoT research community to conduct large-scale, robust and effective IoT simulation, and prototype evaluations.

199 citations

Journal ArticleDOI
TL;DR: A comprehensive survey of authentication protocols for Internet of Things (IoT) is presented in this article, where more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail.
Abstract: In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

179 citations

Posted Content
TL;DR: A taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided.
Abstract: In this paper, we present a comprehensive survey of authentication protocols for Internet of Things (IoT). Specifically, we select and in-detail examine more than forty authentication protocols developed for or applied in the context of the IoT under four environments, including: (1) Machine to machine communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). We start by reviewing all survey articles published in the recent years that focusing on different aspects of the IoT idea. Then, we review threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT. In addition, we provide a taxonomy and comparison of authentication protocols for the IoT in form of tables in five terms, namely, network model, goals, main processes, computation complexity, and communication overhead. Based on the current survey, we identify open issues and suggest hints for future research.

161 citations

Journal ArticleDOI
TL;DR: The PRDSA scheme is proposed to resist Sinkhole attack and guarantee security for IoT, which is the first work that can detect, bypass and locate the sinkhole at the same time.
Abstract: Internet of Things (IoT) applications have been growing significantly in recent years, however, the security issue has not been well studied in the literature for the IoT ecosystem. The sinkhole attack is one of serious destructive attacks for IoT as it is easy to launch the attack and difficult to defend it. In this paper, a Probe Route based Defense Sinkhole Attack (PRDSA) scheme is proposed to resist Sinkhole attack and guarantee security for IoT, which is the first work that can detect, bypass and locate the sinkhole at the same time. The PRDSA scheme proposes a routing mechanism combining the far-sink reverse routing, equal-hop routing, and minimum hop routing, which can effectively circumvent the sinkhole attacks and find a safe route to the real sink, so that the scheme can achieve better sinkhole detection. More importantly, the PRDSA scheme overcomes the limitation of previous schemes that they cannot locate the sinkhole. During the detection of the sinkhole attack, the PRDSA scheme requires the nodes and the sink node to return the signature of the information (e.g., IDs, etc.), so that the location of the sinkhole can be determined. Furthermore, the PRDAS scheme mainly utilizes the characteristics of network energy consumption. The probe route of sinkhole attack mainly occurs in the region where the remaining energy exists. Thus, the PRDSA scheme has little impact on the network lifetime. Theory and experiments show that this scheme can achieve better performance than existing schemes in term of network security and lifetime.

128 citations