Abstract

Security issue in Internet of Things (IoT) is one of the most important aspects to be resolved. Some attacks that occurred in Internet technology are also penetrated IoT. A trust-based security system is a promising solution in IoT as it is suitable for the characteristic of IoT which is distributed, decentralized control and on-off connections. Knowing the behaviors of the attacks might help up to understand of how we may prevent the attacks and plan to mitigate the attacks. In this paper, we simulated trust-based attacks in IoT environment by giving the fake reputation values of an object. For this purpose, we utilized ConTrust model, a trust-based security model. Matlab was used to simulate the attacks, and the simulation result showed that ConTrust model was outperformed on mitigating a trust-based attack. The attack was detected and resolved correctly.

Highlights

  • Internet of Things (IoT) is a new paradigm that is born and developed from Internet technology

  • Preventive measures have been done before, from the physical aspects such as authentication models that are embedded in the chip of the sensor to the use of security framework that applies to all components in a system in IoT

  • Security in IoT becomes interesting and challenging issue because there are always two parties involved in it, the parties who try to defend the system with various prevention efforts, and those who try to attack the system or attackers

Read more

Summary

Introduction

Internet of Things (IoT) is a new paradigm that is born and developed from Internet technology. Various internet technologies can be used in IoT, ranging from Radio Frequency Identification (RFID) to large battery powered systems [1] These technologies and connected objects can be used to form applications on smart cities, smart transportation, smart home, smart logistics, and other various applications. Preventive measures have been done before, from the physical aspects such as authentication models that are embedded in the chip of the sensor to the use of security framework that applies to all components in a system in IoT. In this paper, simulated trust-based attacks are performed to determine the robustness of the ConTrust model. Some simulations were made to find out the robustness of this model against trust-based attack. We discovered that this model was robust enough to prevent a trust-based attack. IoT, including our previous work ConTrust model, Section IV reports simulation result and discussion, and Section V presents the conclusion and future works

Related Works
Security in Internet of Things
ConTrust Model
Pre-processing Stage
Trust Assessment Stage
Trust Value Granting Stage
Recommendation Stage
Trust-based Attack
Simulation and Discussion
Conclusion and Future Works
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call