Book ChapterDOI
A Lightweight Intrusion Detection Scheme Based on Energy Consumption Analysis in 6LowPAN
Tsung-Han Lee,Chih-Hao Wen,Lin-Huang Chang,Hung-Shiou Chiang,Ming-Chun Hsieh +4 more
- pp 1205-1213
Reads0
Chats0
TLDR
A lightweight intrusion detection model based on analysis of node’s consumed in 6LowPAN is proposed and results show the proposed intrusion detection system provides the method to accurately and effectively recognize malicious attacks.Abstract:
6LoWPAN is one of Internet of Things standard, which allows IPv6 over the low-rate wireless personal area networks. All sensor nodes have their own IPv6 address to connect to Internet. Therefore, the challenge of implementing secure communication in the Internet of Things must be addressed. There are various attack in 6LoWPAN, such as Denial-of-service, wormhole and selective forwarding attack methods. And the Dos attack method is one of the major attacks in WSN and 6LoWPAN. The sensor node’s energy will be exhausted by these attacks due to the battery power limitation. For this reason, security has become more important in 6LoWPAN. In this paper, we proposed a lightweight intrusion detection model based on analysis of node’s consumed in 6LowPAN. The 6LoWPAN energy consumption models for mesh-under and route-over routing schemes are also concerned in this paper. The sensor nodes with irregular energy consumptions are identified as malicious attackers. Our simulation results show the proposed intrusion detection system provides the method to accurately and effectively recognize malicious attacks.read more
Citations
More filters
Journal ArticleDOI
A survey of intrusion detection in Internet of Things
TL;DR: A survey of IDS research efforts for IoT is presented to identify leading trends, open issues, and future research possibilities, and classified the IDS proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy.
Journal ArticleDOI
Cyber-Physical Systems Security: Limitations, Issues and Future Trends
TL;DR: The main aspects of CPS and the corresponding applications, technologies, and standards are surveyed and the existing security measures are presented and analyzed while identifying their main limitations.
Journal ArticleDOI
Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
TL;DR: Passban is presented, an intelligent intrusion detection system (IDS) able to protect the IoT devices that are directly connected to it that can be deployed directly on very cheap IoT gateways, taking full advantage of the edge computing paradigm to detect cyber threats as close as possible to the corresponding data sources.
Journal ArticleDOI
Machine Learning Based Intrusion Detection Systems for IoT Applications
Abhishek Verma,Virender Ranga +1 more
TL;DR: The main goals of this study are to motivate IoT security researchers for developing IDSs using ensemble learning, and suggesting appropriate methods for statistical assessment of classifier’s performance.
Journal ArticleDOI
A Review on Machine Learning and Deep Learning Perspectives of IDS for IoT: Recent Updates, Security Issues, and Challenges
Ankit Thakkar,Ritika Lohiya +1 more
TL;DR: A comprehensive survey on Intrusion Detection System (IDS) for IoT is presented and various IDS placement strategies and IDS analysis strategies in IoT architecture are discussed, along with Machine Learning (ML) and Deep Learning techniques for detecting attacks in IoT networks.
References
More filters
Proceedings ArticleDOI
Mitigating routing misbehavior in mobile ad hoc networks
TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Proceedings ArticleDOI
Energy analysis of public-key cryptography for wireless sensor networks
TL;DR: Measurements on an Atmel ATmega128L low-power microcontroller platform indicate that public-key cryptography is very viable on 8-bit energy-constrained platforms even if implemented in software.
Journal ArticleDOI
Denial of Service Attacks in Wireless Networks: The Case of Jammers
TL;DR: This survey presents a detailed up-to-date discussion on the jamming attacks recorded in the literature and describes various techniques proposed for detecting the presence of jammers.
Journal ArticleDOI
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
David Raymond,Scott F. Midkiff +1 more
TL;DR: In this paper, the authors present a survey of denial-of-service threats and countermeasures considering wireless sensor platforms' resource constraints as well as the denial of sleep attack, which targets a battery-powered device's energy supply.
Journal ArticleDOI
A survey on jamming attacks and countermeasures in WSNs
TL;DR: The objective of this article is to provide a general overview of the critical issue of jamming in WSNs and cover all the relevant work, providing the interested researcher pointers for open research issues in this field.
Related Papers (5)
Real Time Intrusion and Wormhole Attack Detection in Internet of Things
Pavan Pongle,Gurunath Chavan +1 more