scispace - formally typeset
Book ChapterDOI

A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN

Reads0
Chats0
TLDR
A lightweight intrusion detection model based on analysis of node’s consumed in 6LowPAN is proposed and results show the proposed intrusion detection system provides the method to accurately and effectively recognize malicious attacks.
Abstract
6LoWPAN is one of Internet of Things standard, which allows IPv6 over the low-rate wireless personal area networks. All sensor nodes have their own IPv6 address to connect to Internet. Therefore, the challenge of implementing secure communication in the Internet of Things must be addressed. There are various attack in 6LoWPAN, such as Denial-of-service, wormhole and selective forwarding attack methods. And the Dos attack method is one of the major attacks in WSN and 6LoWPAN. The sensor node’s energy will be exhausted by these attacks due to the battery power limitation. For this reason, security has become more important in 6LoWPAN. In this paper, we proposed a lightweight intrusion detection model based on analysis of node’s consumed in 6LowPAN. The 6LoWPAN energy consumption models for mesh-under and route-over routing schemes are also concerned in this paper. The sensor nodes with irregular energy consumptions are identified as malicious attackers. Our simulation results show the proposed intrusion detection system provides the method to accurately and effectively recognize malicious attacks.

read more

Citations
More filters
Journal ArticleDOI

A survey of intrusion detection in Internet of Things

TL;DR: A survey of IDS research efforts for IoT is presented to identify leading trends, open issues, and future research possibilities, and classified the IDS proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy.
Journal ArticleDOI

Cyber-Physical Systems Security: Limitations, Issues and Future Trends

TL;DR: The main aspects of CPS and the corresponding applications, technologies, and standards are surveyed and the existing security measures are presented and analyzed while identifying their main limitations.
Journal ArticleDOI

Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices

TL;DR: Passban is presented, an intelligent intrusion detection system (IDS) able to protect the IoT devices that are directly connected to it that can be deployed directly on very cheap IoT gateways, taking full advantage of the edge computing paradigm to detect cyber threats as close as possible to the corresponding data sources.
Journal ArticleDOI

Machine Learning Based Intrusion Detection Systems for IoT Applications

TL;DR: The main goals of this study are to motivate IoT security researchers for developing IDSs using ensemble learning, and suggesting appropriate methods for statistical assessment of classifier’s performance.
Journal ArticleDOI

A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges

TL;DR: A comprehensive survey on Intrusion Detection System (IDS) for IoT is presented and various IDS placement strategies and IDS analysis strategies in IoT architecture are discussed, along with Machine Learning (ML) and Deep Learning techniques for detecting attacks in IoT networks.
References
More filters
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Proceedings ArticleDOI

Energy analysis of public-key cryptography for wireless sensor networks

TL;DR: Measurements on an Atmel ATmega128L low-power microcontroller platform indicate that public-key cryptography is very viable on 8-bit energy-constrained platforms even if implemented in software.
Journal ArticleDOI

Denial of Service Attacks in Wireless Networks: The Case of Jammers

TL;DR: This survey presents a detailed up-to-date discussion on the jamming attacks recorded in the literature and describes various techniques proposed for detecting the presence of jammers.
Journal ArticleDOI

Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses

TL;DR: In this paper, the authors present a survey of denial-of-service threats and countermeasures considering wireless sensor platforms' resource constraints as well as the denial of sleep attack, which targets a battery-powered device's energy supply.
Journal ArticleDOI

A survey on jamming attacks and countermeasures in WSNs

TL;DR: The objective of this article is to provide a general overview of the critical issue of jamming in WSNs and cover all the relevant work, providing the interested researcher pointers for open research issues in this field.
Related Papers (5)