Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3215466.3215469acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Impacts & Detection of Network Layer Attacks on IoT Networks

Published: 26 June 2018 Publication History

Abstract

With the advent of the Internet of Things (IoT), wireless sensor and actuator networks, subsequently referred to as IoT networks (IoTNs), are proliferating at an unprecedented rate in several newfound areas such as smart cities, health care, and transportation, and consequently, securing them is of paramount importance. In this paper, we present several useful insights from an exploratory study of the impacts of network layer attacks on IoTNs. We envision that these insights will guide the design of future frameworks to defend against network layer attacks. We also present a preliminary such framework and demonstrate its effectiveness in detecting network layer attacks through experiments on a real IoTN test-bed.

References

[1]
Changlong Chen, Min Song, and George Hsieh. 2010. Intrusion detection of sinkhole attacks in large-scale wireless sensor networks. In WCNIS, 711--716.
[2]
T Clausen and P Jacquet. 2003. RFC 3626: Optimized link state routing protocol.
[3]
John A Hartigan and Manchek A Wong. 1979. Algorithm AS 136: A k-means clustering algorithm. Journal of the Royal Statistical Society. 28, 1 (1979), 100--108.
[4]
Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, and Abbas Jamalipour. 2006. Analysis of the node isolation attack against OLSR-based mobile ad hoc networks. In Int. Symp. on Computer Networks, 30--35.
[5]
Sophia Kaplantzis, Alistair Shilton, Nallasamy Mani, and Y Ahmet Sekercioglu. 2007. Detecting selective forwarding attacks in wireless sensor networks using support vector machines. In ISSNIP, 335--340.
[6]
Wazir Zada Khan, Xiang Yang, Mohammed Y Aalsalem, and Quratulain Arshad. 2011. Comprehensive study of selective forwarding attack in wireless sensor networks. Int. Journal of Computer Network and Information Security 3, 1, 1.
[7]
Hero Modares, Rosli Salleh, and Amirhossein Moravejosharieh. 2011. Overview of security issues in wireless sensor networks. In CIMSiM, 308--311.
[8]
Thierry Plesse et. al. 2005. OLSR performance measurement in a military mobile ad hoc network. Ad Hoc Networks 3, 5 (2005), 575--588.
[9]
David R Raymond and Scott F Midkiff. 2008. Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing 7, 1 (2008).
[10]
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M Belding-Royer. 2002. A secure routing protocol for ad hoc networks. In ICNP.
[11]
Bo Sun, Kui Wu, and Udo W Pooch. 2003. Zone-based intrusion detection for mobile ad hoc networks. Int. Journal of Ad Hoc and Sensor Wireless Networks 2, 3.
[12]
Weichao Wang, Bharat Bhargava, Yi Lu, and Xiaoxin Wu. 2006. Defending against wormhole attacks in mobile ad hoc networks. Wireless communications and mobile computing 6, 4, 483--503.
[13]
Hubert Zimmermann. 1980. OSI reference model--The ISO model of architecture for open systems interconnection. IEEE Trans. on Communications 28, 4, 425--432.

Cited By

View all
  • (2023)Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT NetworkInformation Security, Privacy and Digital Forensics10.1007/978-981-99-5091-1_16(213-230)Online publication date: 2-Nov-2023
  • (2020)Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2020.30063588(120331-120350)Online publication date: 2020
  • (2020)Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of ThingsInternet of Things, Smart Computing and Technology: A Roadmap Ahead10.1007/978-3-030-39047-1_16(361-374)Online publication date: 15-Feb-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Mobile IoT SSP'18: Proceedings of the 1st ACM MobiHoc Workshop on Mobile IoT Sensing, Security, and Privacy
June 2018
19 pages
ISBN:9781450358606
DOI:10.1145/3215466
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2018

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

Mobihoc '18
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT NetworkInformation Security, Privacy and Digital Forensics10.1007/978-981-99-5091-1_16(213-230)Online publication date: 2-Nov-2023
  • (2020)Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature ReviewIEEE Access10.1109/ACCESS.2020.30063588(120331-120350)Online publication date: 2020
  • (2020)Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of ThingsInternet of Things, Smart Computing and Technology: A Roadmap Ahead10.1007/978-3-030-39047-1_16(361-374)Online publication date: 15-Feb-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media