Abstract

The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes (s) have some properties (for example, they first attract the other normal nodes for the shortest path to the destination and when normal nodes initiate the process of sending their packets through that path (i.e., via ), the attacker nodes start disrupting the traffic flow of the network). In the presence of s, the destination (for example, sink node i.e., gateway/base station) does not receive the required information or it may receive partial or modified information. This results in reduction of the network performance and degradation in efficiency and reliability of the communication. In the presence of such an attack, the throughput decreases, end-to-end delay increases and packet delivery ratio decreases. Moreover, it may harm other network performance parameters. Hence, it becomes extremely essential to provide an effective and competent scheme to mitigate this attack in EIoT. In this paper, an intrusion detection scheme to protect EIoT environment against sinkhole attack is proposed, which is named as SAD-EIoT. In SAD-EIoT, the resource rich edge nodes (edge servers) perform the detection of different types of sinkhole attacker nodes with the help of exchanging messages. The practical demonstration of SAD-EIoT is also provided using the well known NS2 simulator to compute the various performance parameters. Additionally, the security analysis of SAD-EIoT is conducted to prove its resiliency against various types of s. SAD-EIoT achieves around detection rate and false positive rate, which are considerably better than other related existing schemes. Apart from those, SAD-EIoT is proficient with respect to computation and communication costs. Eventually, SAD-EIoT will be a suitable match for those applications which can be used in critical and sensitive operations (for example, surveillance, security and monitoring systems).

Highlights

  • Internet of Things (IoT) objects include smart sensors which are capable of gathering and transmitting the sensing information in an IoT network where the human involvement is minimallySensors 2020, 20, 1300; doi:10.3390/s20051300 www.mdpi.com/journal/sensorsSensors 2020, 20, 1300 required

  • The detection of sinkhole attack is executed in the following two phases: Phase 1 (Identifying the presence of sinkhole attacker nodes): In this phase, we identify the existence of SH As in the network by applying the steps in Algorithm 1

  • Most of the existing schemes for sinkhole node detection are not effective as they cannot identify all possible types of SH As in EIoT

Read more

Summary

Introduction

Internet of Things (IoT) objects include smart sensors (devices) which are capable of gathering and transmitting the sensing information in an IoT network where the human involvement is minimallySensors 2020, 20, 1300; doi:10.3390/s20051300 www.mdpi.com/journal/sensorsSensors 2020, 20, 1300 required. All these scenarios are installed with smart devices such as smart home appliances, smart traffic management appliances and smart environment monitoring devices These devices are placed and installed in order to communicate with other heterogeneous devices over the Internet via the gateway node(s) ( GW N ) where the traffic goes out and comes in. In this scenario, various users (i.e., smart home users) use the GW Ns to access the real-time information via smart devices deployed in the network [1,3,4]. Three types of detection schemes such as intelligent hybrid intrusion detection system (IDS), hybrid IDS and misuse

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call