scispace - formally typeset
Journal ArticleDOI

SVELTE: Real-time intrusion detection in the Internet of Things

Shahid Raza, +2 more
- Vol. 11, Iss: 8, pp 2661-2674
TLDR
This paper design, implement, and evaluate a novel intrusion detection system for the IoT that is primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding, but can be extended to detect other attacks.
Abstract
In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. Currently, there are no IDSs that meet the requirements of the IPv6-connected IoT since the available approaches are either customized for Wireless Sensor Networks (WSN) or for the conventional Internet. In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE. In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding. However, our approach can be extended to detect other attacks. We implement SVELTE in the Contiki OS and thoroughly evaluate it. Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks. However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes. Also, SVELTE's overhead is small enough to deploy it on constrained nodes with limited energy and memory capacity.

read more

Citations
More filters
Journal ArticleDOI

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

TL;DR: An overview of the Internet of Things with emphasis on enabling technologies, protocols, and application issues, and some of the key IoT challenges presented in the recent literature are provided and a summary of related research work is provided.
Journal ArticleDOI

A survey on trust management for Internet of Things

TL;DR: This paper investigates the properties of trust, proposes objectives of IoT trust management, and provides a survey on the current literature advances towards trustworthy IoT to propose a research model for holistic trust management in IoT.
Journal ArticleDOI

Internet of Things security

TL;DR: This study aims to serve as a useful manual of existing security threats and vulnerabilities of the IoT heterogeneous environment and proposes possible solutions for improving the IoT security architecture.
Journal ArticleDOI

A survey of intrusion detection in Internet of Things

TL;DR: A survey of IDS research efforts for IoT is presented to identify leading trends, open issues, and future research possibilities, and classified the IDS proposed in the literature according to the following attributes: detection method, IDS placement strategy, security threat and validation strategy.
Journal ArticleDOI

A Comprehensive Study of Security of Internet-of-Things

TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
References
More filters
Proceedings ArticleDOI

Mitigating routing misbehavior in mobile ad hoc networks

TL;DR: Two techniques that improve throughput in an ad hoc network in the presence of nodes that agree to forward packets but fail to do so are described, using a watchdog that identifies misbehaving nodes and a pathrater that helps routing protocols avoid these nodes.
Proceedings ArticleDOI

A high-throughput path metric for multi-hop wireless routing

TL;DR: Measurements taken from a 29-node 802.11b test-bed demonstrate the poor performance of minimum hop-count, illustrate the causes of that poor performance, and confirm that ETX improves performance.
Journal ArticleDOI

Secure routing in wireless sensor networks: attacks and countermeasures

TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Proceedings ArticleDOI

Contiki - a lightweight and flexible operating system for tiny networked sensors

TL;DR: This work presents Contiki, a lightweight operating system with support for dynamic loading and replacement of individual programs and services, built around an event-driven kernel but provides optional preemptive multithreading that can be applied to individual processes.
ReportDOI

RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks

Tim Winter
TL;DR: This document specifies the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL), which provides a mechanism whereby multipoint-to-point traffic from devices inside the LLN towards a central control point as well as point- to- multipoint traffic from the central control points to the devices insideThe LLN are supported.
Related Papers (5)