Abstract

The Internet of Things (IoT) is an emerging concept in the field of information technology. IoT can integrate any real-time entity with another, using sensing, computing and communication capabilities to offer enhanced services in everyday life. In this article, IoT-based patient health monitoring is considered for use in IoT sensors deployed in devices. These devices are attached to the body of the patient for timely tracking of his or her health condition. During data transfers from devices connected to the patient’s body to the doctor, the data may be susceptible to security threats. IoT devices are subjected to many routing attacks, like blackhole, greyhole, Sybil, sinkhole and wormhole attacks. Sybil attacks are the most dangerous routing attacks. This type of attack involves stealing the identities of legitimate nodes; this, in turn, leads to information loss, misinterpretation in the network and an increase in routing disturbances. Hence, in this paper, we propose the use of the traditional Caesar Cipher Algorithm (CCA) along with the lightweight encryption algorithm (LEA) and the Received Signal Strength Indicator (RSSI) to detect and prevent Sybil attacks in an IoT environment. The proposed algorithm detects the false node in a particular path by announcing the attack to another node. It also prevents the attack by choosing an alternative path by which to forward data packets to the desired users. To ensure authentication, privacy and data integrity, the lightweight encryption algorithm with a 64-bit key is used with AODV as the routing protocol.

Highlights

  • The Internet of Things (IoT) [1,2,3] is a new concept that describes how real-time entities are integrated within a network

  • Bedi and Singh proposed the Bee Colony Optimization (BCO) [17] method to detect and prevent a Sybil attack that occurs over Low-Energy Adaptive Clustering Hierarchy (LEACH)-based Wireless Sensor Networks (WSNs) when this attack has resulted in some concerns while creating the route over the network

  • 5 Results and discussion The Received Signal Strength Indicator (RSSI)-lightweight encryption algorithm (LEA)-AODV method has been simulated by using MATLAB 2017a

Read more

Summary

Introduction

The Internet of Things (IoT) [1,2,3] is a new concept that describes how real-time entities are integrated within a network. Bedi and Singh proposed the Bee Colony Optimization (BCO) [17] method to detect and prevent a Sybil attack that occurs over Low-Energy Adaptive Clustering Hierarchy (LEACH)-based Wireless Sensor Networks (WSNs) when this attack has resulted in some concerns while creating the route over the network. Jan et al presented a lightweight detection mechanism for Sybil attack detection, which depends on the obtained signal strength of the packets [27] This is the implementation of a centralised clustering-based hierarchical network. 4.1 Received signal strength-based Sybil node detection The differences between the normal and attacker nodes are identified by the RSSI [28, 29]. The purpose of scrambling is to substitute a character (or byte) of data for another character (or byte) of data

CCA encryption Input
Results and discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call