Abstract
Security issue in Internet of Things (IoT) is one of the most important aspects to be resolved. Some attacks that occurred in Internet technology are also penetrated IoT. A trust-based security system is a promising solution in IoT as it is suitable for the characteristic of IoT which is distributed, decentralized control and on-off connections. Knowing the behaviors of the attacks might help up to understand of how we may prevent the attacks and plan to mitigate the attacks. In this paper, we simulated trust-based attacks in IoT environment by giving the fake reputation values of an object. For this purpose, we utilized ConTrust model, a trust-based security model. Matlab was used to simulate the attacks, and the simulation result showed that ConTrust model was outperformed on mitigating a trust-based attack. The attack was detected and resolved correctly.
Highlights
Internet of Things (IoT) is a new paradigm that is born and developed from Internet technology
Preventive measures have been done before, from the physical aspects such as authentication models that are embedded in the chip of the sensor to the use of security framework that applies to all components in a system in IoT
Security in IoT becomes interesting and challenging issue because there are always two parties involved in it, the parties who try to defend the system with various prevention efforts, and those who try to attack the system or attackers
Summary
Internet of Things (IoT) is a new paradigm that is born and developed from Internet technology. Various internet technologies can be used in IoT, ranging from Radio Frequency Identification (RFID) to large battery powered systems [1] These technologies and connected objects can be used to form applications on smart cities, smart transportation, smart home, smart logistics, and other various applications. Preventive measures have been done before, from the physical aspects such as authentication models that are embedded in the chip of the sensor to the use of security framework that applies to all components in a system in IoT. In this paper, simulated trust-based attacks are performed to determine the robustness of the ConTrust model. Some simulations were made to find out the robustness of this model against trust-based attack. We discovered that this model was robust enough to prevent a trust-based attack. IoT, including our previous work ConTrust model, Section IV reports simulation result and discussion, and Section V presents the conclusion and future works
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have