Effectual Algorithm for Avoidance of Version Number Attacks in Internet of Things (IoT)

  • Authors

    • Dr. Esraa Saleh Alomari
    2018-11-30
    https://doi.org/10.14419/ijet.v7i4.28.28180
  • Advance Wireless Networks, Energy Aware Wireless Networks, Power and Energy Optimized Wireless Systems
  • Internet of Things (IoT) is one of the emerging domains in the wireless communication and technologies whereby the sensor based devices interact with each other using radio frequencies. The enormous work is going on in this segment to enrich the security still there is huge scope of research. In IoT, the implementations of Vehicular Adhoc Networks (VANET), Internet of Vehicles (IoV), Smart Offices, Smart Cities are quite prominent which are addressed in this research work. With the use of soft computing approaches, the implementation of higher degree of security can be done. "In this research manuscript, the approach to integrate the dynamic key exchange with the Elephant Herd Optimization (EHO) is presented to achieve the higher degree of energy optimization and overall lifetime of the network communication. The key concept of the cluster head shuffling using EHO and inner modules of key exchange are simulated in Contiki-Cooja that is open source simulator for advance wireless networks". But the version number attacks can destroy the overall scenario and the performance in which the exploitation of multiple resources can be done. In this research work, the approach to defeat and push back the version number attacks in RPL using dynamic security is implemented and evaluated on multiple parameters.

     

     

     

  • References

    1. [1] Zanella A, N. Bui, A. Castellani, L. Vangelista and L, Zorzi. “Internet of things for smart cities†IEEE Internet of Things Journal. pp. 22-32., 2014

      [2] Zhang, K., Liang, X., Lu, R., & Shen, X. “Sybil attacks and their defenses in the internet of things.†IEEE Internet of Things Journal, 1(5), 372-383, 2014

      [3] Farooq MU, Waseem M, Khairi A, Mazhar S. “A critical analysis on the security concerns of internet of things (IoT).†International Journal of Computer Applications. pp. 1-7, 2015

      [4] Stankovic JA. “Research directions for the internet of thingsâ€. IEEE Internet of Things Journal. pp 3-9, 2014

      [5] O. Said, M. Masud., “Towards internet of things: Survey and future visionâ€. International Journal of Computer Networks. pp.1-7, 2015

      [6] Perera C, Zaslavsky A, Christen P, Georgakopoulos D. “Context aware computing for the internet of things: A surveyâ€, IEEE Communications Surveys & Tutorials., 414-454, 2014.

      [7] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,†Wireless Networks, vol. 20, no. 8, pp. 2481–2501, 2014.

      [8] L. Chen, Z. Yan, W. Zhang, and R. Kantola, “TruSMS: A trustworthy SMS spam control system based on trust management,†Future Generation Computer Systems, vol. 49, no. October, pp. 77–93, 2015.

      [9] D. Lake, R. Milito, M. Morrow, and R. Vargheese, “Internet of Things: Architectural Framework for eHealth Security,†Journal of ICT, vol. 1, no. 3, pp. 301–328, 2014.

      [10] N. Ye, Y. Zhu, R. C. Wang, R. Malekian, and Q. M. Lin, “An efficient authentication and access control scheme for perception layer of internet of things,†Appl. Math. Inf. Sci., vol. 8, no. 4, pp. 1617–1624, 2014.

      [11] M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,†Ad Hoc Networks, vol. 20, no. April, pp. 96–112, 2014.

      [12] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,†Computer Networks, vol. 76, pp. 146–164, 2015.

      [13] J. Granjal, E. Monteiro, and J. Sa Silva, “Security for the internet of things: A survey of existing protocols and open research issues,†IEEE Commun. Surv. Tutorials, vol. 17, no. 3, pp. 1294–1312, 2015.

      [14] K. T. Nguyen, M. Laurent, and N. Oualha, “Survey on secure communication protocols for the Internet of Things,†Ad Hoc Networks, vol. 32, no. February, pp. 17–31, 2015.

      [15] M. Vucinic, B. Tourancheau, F. Rousseau, A. Duda, L. Damon, and R. Guizzetti, “OSCAR: Object Security Architecture for the Internet of Things,†Science Direct Ad Hoc Networks, pp. 3-16, 2014.

      [16] W. Trappe, R. Howard, and R. S. Moore, “Low-energy security: Limits and opportunities in the internet of things,†IEEE Security and Privacy, vol. 13, no. 1, pp. 14–21, 2015.

      [17] F. Li, Z. Zheng, and C. Jin, “Secure and efficient data transmission in the Internet of Things,†Telecommunication Systems, vol. 62, no. 1, pp. 111–122, 2016.

      [18] S. R. Moosavi, T. N. Gia, E. Nigussie, A. M. Rahmani, S. Virtanen, H. Tenhunen, and J. Isoaho, “End-to-end security scheme for mobility enabled healthcare Internet of Things,†Futur. Gener. Comput. Syst., vol. 64, no. May, pp. 108–124, 2016.

      [19] K. A. Rafidha Rehiman and S. Veni, “A secure authentication infrastructure for IoT enabled smart mobile devices - an initial prototype,†Indian J. Sci. Technol., vol. 9, no. 9, pp. 1-6 2016.

      [20] D. Airehrour, J. Gutierrez, and S. K. Ray, “Secure routing for internet of things: A survey,†Journal of Network and Computer Applications., vol. 66, pp. 198–213, 2016.

      [21] E. Bertino, “Data Security and Privacy in the IoT,†Proc. 19th Int. Conf. Extending Database Technol., Open Proceedings, pp. 1–3, 2016.

      [22] M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “SIT : A Lightweight Encryption Algorithm for Secure Internet of Things,†International Journal of Advanced Computer Science and Applications, vol. 8, no. 1, pp. 1–10, 2017.

      [23] M. B. Mollah, A. K. Azad, and A. Vasilakos, “Secure data sharing and searching at the edge of cloud-assisted internet of things,†IEEE Cloud Computing, vol. 4, no. 1, pp. 34–42, 2017.

      [24] P. P. Jayaraman, X. Yang, A. Yavari, D. Georgakopoulos, and X. Yi, “Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation,†Future Generation Computer Systems, pp. 1–10, 2017.

      [25] Schmitt, M. Noack, W. Hu, T. Kothmayr, and B. Stiller, “Two-way Authentication for the Internet-of-Things,†Securing Internet Things through Progress. IGI Global Journals, pp. 27-56, 2017.

      [26] S. Prabhakar. International Journal of Research in Computer Applications and Robotics, vol. 3, no. 6, pp. 93-101, 2017.

  • Downloads

  • How to Cite

    Esraa Saleh Alomari, D. (2018). Effectual Algorithm for Avoidance of Version Number Attacks in Internet of Things (IoT). International Journal of Engineering & Technology, 7(4.28), 595-598. https://doi.org/10.14419/ijet.v7i4.28.28180