A Context-Aware Information-Based Clone Node Attack Detection Scheme in Internet of Things

06/30/2021
by   Khizar Hameed, et al.
0

The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousand IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing, and sharing information. Nonetheless, IoT devices are frequently deployed in hostile environments, wherein adversaries attempt to capture and breach them in order to seize control of the entire network. One such example of potentially malicious behaviour is the cloning of IoT devices, in which an attacker can physically capture the devices, obtain some sensitive information, duplicate the devices, and intelligently deploy them in desired locations to conduct various insider attacks. A device cloning attack on IoT networks is a significant security concern since it allows for selective forwarding, sink-hole, and black-hole attacks. To address this issue, this paper provides an efficient scheme for detecting clone node attacks on IoT networks that makes use of semantic information about IoT devices known as context information sensed from the deployed environment to locate them securely. We design a location proof mechanism by combining location proofs and batch verification of the extended elliptic curve digital signature technique to accelerate the verification process at selected trusted nodes. We demonstrate the security of our scheme and its resilience to secure clone node attack detection by conducting a comprehensive security analysis. The performance of our proposed scheme provides a high degree of detection accuracy with minimal detection time and significantly reduces the computation, communication and storage overhead.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/12/2020

On Runtime Software Security of TrustZone-M based IoT Devices

Internet of Things (IoT) devices have been increasingly integrated into ...
research
08/23/2021

Towards a Formal Modelling, Analysis, and Verification of a Clone Node Attack Detection Scheme in the Internet of Things

In a clone node attack, an attacker attempted to physically capture the ...
research
10/10/2021

Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems

Internet of Things (IoT) is a rapidly growing industry currently being i...
research
01/06/2020

Towards a secure behavior modeling for IoT networks using Blockchain

Internet of Things (IoT) occupies a vital aspect of our everyday lives. ...
research
09/17/2019

Machine Learning based IoT Edge Node Security Attack and Countermeasures

Advances in technology have enabled tremendous progress in the developme...
research
11/27/2019

A Secure and Robust Scheme for Sharing Confidential Information in IoT Systems

In Internet of Things (IoT) systems with security demands, there is ofte...
research
06/07/2022

A Secure and Trusted Mechanism for Industrial IoT Network using Blockchain

Industrial Internet-of-Things (IIoT) is a powerful IoT application which...

Please sign up or login with your details

Forgot password? Click here to reset