The Internet of Things(IoT)comprises numerous resource-constrained devices that generate large volumes of data.The inherent vulnerabilities in IoT infrastructure,such as easily spoofed IP and MAC addresses,pose signif...The Internet of Things(IoT)comprises numerous resource-constrained devices that generate large volumes of data.The inherent vulnerabilities in IoT infrastructure,such as easily spoofed IP and MAC addresses,pose significant security challenges.Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations.Therefore,the Routing Protocol for Low-Power and Lossy Networks(RPL)is widely used in IoT systems.However,the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks,including Sybil attacks.To address these issues,this paper proposes a centralized and collaborative approach for securing RPL-based IoT against Sybil attacks.The proposed approach consists of detection and prevention algorithms based on the Random Password Generation and comparison methodology(RPG).The detection algorithm verifies the passwords of communicating nodes before comparing their keys and constant IDs,while the prevention algorithm utilizes a delivery delay ratio to restrict the participation of sensor nodes in communication.Through simulations,it is demonstrated that the proposed approach achieves better results compared to distributed defense mechanisms in terms of throughput,average delivery delay and detection rate.Moreover,the proposed countermeasure effectively mitigates brute-force and side-channel attacks in addition to Sybil attacks.The findings suggest that implementing the RPG-based detection and prevention algorithms can provide robust security for RPL-based IoT networks.展开更多
Mobile Ad hoc Networks(MANETs)have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic.These fake nodes need to be detected and deactivated for...Mobile Ad hoc Networks(MANETs)have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic.These fake nodes need to be detected and deactivated for security reasons,to avoid harming the data collected by various applications.The MANET is an emerging field that promotes trust management among devices.Transparency is becoming more essential in the communication process,which is why clear and honest communication strategies are needed.Trust Management allows for MANET devices with different security protocols to connect.If a device finds difficulty in sending a message to the destination,the purpose of the communication process won’t be achieved and this would disappoint both that device and all of your devices in general.This paper presents,the Two-Tier Multi-Trust based Algorithm for Preventing Sybil Attacks in MANETs(TMTACS).The TMTACS provides a two-tier security mechanism that can grant or revoke trust in the Nodes of the MANET.It’s a smart way to identify Sybil nodes in the system.A proficient cluster head selection algorithm is also defined,which selects cluster head efficiently and does load balancing to avoid resource consumption from a single node only.Also,for routing efficient path is selected to deteriorate energy consumption and maximize throughput.The recent technique is compared with Secured QoS aware Energy Efficient Routing(SQEER),Adaptive Trust-Based Routing Protocol(ATRP),and Secure Trust-Aware Energy-Efficient Adaptive Routing(STEAR)in terms of Packet Delivery Ratio(PDR),consumption of energy etc.The simulation was performed on MATrix LABoratory(MATLAB)and the results achieved by the present scheme are better than existing techniques.展开更多
Wireless sensor network nodes(WSN nodes) have limited computing power,storage capacity,communication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil attack.In order to prevent Sybil attacks,a n...Wireless sensor network nodes(WSN nodes) have limited computing power,storage capacity,communication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil attack.In order to prevent Sybil attacks,a new key distribution scheme for wireless sensor networks is presented.In this scheme,the key information and node ID are associated,and then the attacker is difficult to forge identity ID and the key information corresponding to ID can not be forged.This scheme can use low-power to resist the Sybil attack and give full play to the resource advantages of the cluster head.The computing,storage and communication is mainly undertaken by the cluster head overhead to achieve the lowest energy consumption and resist against nodes capture attack.Theoretical analysis and experimental results show that compared with the traditional scheme presented in Ref.[14],the capture rate of general nodes of cluster reduces 40%,and the capture rate of cluster heads reduces 50%.So the scheme presented in this paper can improve resilience against nodes capture attack and reduce node power consumption.展开更多
基金funded by Ajman University,UAE under the Project Grant ID:2022-IRG-ENIT-4,received by R.N.B.R.,https://www.ajman.ac.ae/.
文摘The Internet of Things(IoT)comprises numerous resource-constrained devices that generate large volumes of data.The inherent vulnerabilities in IoT infrastructure,such as easily spoofed IP and MAC addresses,pose significant security challenges.Traditional routing protocols designed for wired or wireless networks may not be suitable for IoT networks due to their limitations.Therefore,the Routing Protocol for Low-Power and Lossy Networks(RPL)is widely used in IoT systems.However,the built-in security mechanism of RPL is inadequate in defending against sophisticated routing attacks,including Sybil attacks.To address these issues,this paper proposes a centralized and collaborative approach for securing RPL-based IoT against Sybil attacks.The proposed approach consists of detection and prevention algorithms based on the Random Password Generation and comparison methodology(RPG).The detection algorithm verifies the passwords of communicating nodes before comparing their keys and constant IDs,while the prevention algorithm utilizes a delivery delay ratio to restrict the participation of sensor nodes in communication.Through simulations,it is demonstrated that the proposed approach achieves better results compared to distributed defense mechanisms in terms of throughput,average delivery delay and detection rate.Moreover,the proposed countermeasure effectively mitigates brute-force and side-channel attacks in addition to Sybil attacks.The findings suggest that implementing the RPG-based detection and prevention algorithms can provide robust security for RPL-based IoT networks.
文摘Mobile Ad hoc Networks(MANETs)have always been vulnerable to Sybil attacks in which users create fake nodes to trick the system into thinking they’re authentic.These fake nodes need to be detected and deactivated for security reasons,to avoid harming the data collected by various applications.The MANET is an emerging field that promotes trust management among devices.Transparency is becoming more essential in the communication process,which is why clear and honest communication strategies are needed.Trust Management allows for MANET devices with different security protocols to connect.If a device finds difficulty in sending a message to the destination,the purpose of the communication process won’t be achieved and this would disappoint both that device and all of your devices in general.This paper presents,the Two-Tier Multi-Trust based Algorithm for Preventing Sybil Attacks in MANETs(TMTACS).The TMTACS provides a two-tier security mechanism that can grant or revoke trust in the Nodes of the MANET.It’s a smart way to identify Sybil nodes in the system.A proficient cluster head selection algorithm is also defined,which selects cluster head efficiently and does load balancing to avoid resource consumption from a single node only.Also,for routing efficient path is selected to deteriorate energy consumption and maximize throughput.The recent technique is compared with Secured QoS aware Energy Efficient Routing(SQEER),Adaptive Trust-Based Routing Protocol(ATRP),and Secure Trust-Aware Energy-Efficient Adaptive Routing(STEAR)in terms of Packet Delivery Ratio(PDR),consumption of energy etc.The simulation was performed on MATrix LABoratory(MATLAB)and the results achieved by the present scheme are better than existing techniques.
基金This paper was supported by the National Science Foundation for Young Scholars of China under Crant No.61001091 .
文摘Wireless sensor network nodes(WSN nodes) have limited computing power,storage capacity,communication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil attack.In order to prevent Sybil attacks,a new key distribution scheme for wireless sensor networks is presented.In this scheme,the key information and node ID are associated,and then the attacker is difficult to forge identity ID and the key information corresponding to ID can not be forged.This scheme can use low-power to resist the Sybil attack and give full play to the resource advantages of the cluster head.The computing,storage and communication is mainly undertaken by the cluster head overhead to achieve the lowest energy consumption and resist against nodes capture attack.Theoretical analysis and experimental results show that compared with the traditional scheme presented in Ref.[14],the capture rate of general nodes of cluster reduces 40%,and the capture rate of cluster heads reduces 50%.So the scheme presented in this paper can improve resilience against nodes capture attack and reduce node power consumption.