Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication

01/15/2020
by   Kobra Mabodi, et al.
0

The internet of things (IoT) is able to provide a prediction of linked, universal, and smart nodes that have autonomous interaction when they present services. Because of wide openness, relatively high processing power, and wide distribution of IoT things, they are ideal for attacks of the gray hole. In the gray hole attack, the attacker fakes itself as the shortest path to the destination that is a thing here. This causes the routing packets not to reach the destination. The proposed method is based on the AODV routing protocol and is presented under the MTISS-IoT name which means for the reduction of gray hole attacks using check node information. In this paper, a hybrid approach is proposed based on cryptographic authentication. The proposed approach consists of four phases, such as the verifying node trust in the IoT, testing the routes, gray hole attack discovery, and the malicious attack elimination process in MTISS-IoT. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the MTISS-IoT method can achieve a false positive rate of 14.104 gray hole attack was launched.

READ FULL TEXT

page 2

page 4

page 11

research
03/31/2021

A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema

The Internet of Things, also known as the IoT, refers to the billions of...
research
07/27/2018

Internet of Things Security and Forensics: Challenges and Opportunities

The Internet of Things (IoT) envisions pervasive, connected, and smart n...
research
11/08/2019

A Novel Sybil Attack Detection Scheme Based on Edge Computing for Mobile IoT Environment

Internet of things (IoT) connects all items to the Internet through info...
research
01/18/2022

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Existing authentication solutions proposed for Internet of Things (IoT) ...
research
11/21/2020

A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem

Internet of Things (IoT) provides the possibility for milliards of devic...
research
01/10/2019

Secure and Computationally-Efficient Cryptographic Primitive based on Cellular Automation

Mageto, a random number generator based on one-dimensional cellular auto...
research
05/14/2020

Cognitive Amplifier for Internet of Things

We present a Cognitive Amplifier framework to augment things part of an ...

Please sign up or login with your details

Forgot password? Click here to reset