Abstract
The Internet of Things (IoT) has become a widespread technology where everyday objects are being transferred toward intelligent devices. These smart devices incorporate sensing, computing, and networking abilities into them. A smartphone, a smartwatch can be utilized for various tasks other than calling and timekeeping. Even home appliances also incorporate a midrange computer. Therefore, the most advanced applications and services have considerably risen. Despite numerous gains, security threats increased in terms of recorded catastrophic events as well as attack severity. There are multiple threads in 6LoWPAN and related routing protocol. In our research paper, we perform and assess an energy-efficient, lightweight intrusion detection system (IDS) for the 6LoWPAN network. The primary goal of this paper to target routing attacks (i.e., selective-forwarding, sinkhole, etc.). Our intended energy-efficient lightweight defense solution which identifies sinkhole attack in the IoT ecosystem. The defense method is executed with the help of Cooja network simulator on the Contiki OS. The experimental outcomes show that the solution is lightweight and can identify the sinkhole attack with a noteworthy performance, and provides 95.86% TPR and 94.31% TNR rate. It also shows minimum memory (RAM/ROM) utilization and energy consumption, which is comparable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sharma, N., Shamkuwar, M., Singh, I.: The history, present and future with IoT. In: Balas, V.E., Solanki, V.K., Kumar, R., Khari, M. (eds.) Internet of Things and Big Data Analytics for Smart Generation. ISRL, vol. 154, pp. 27–51. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-04203-5_3
Sharma, S., Chang, V., Tim, U.S., Wong, J., Gadia, S.: Cloud and IoT-based emerging services systems. Cluster Comput. 22(1), 71–91 (2019)
Mekki, K., Bajic, E., Chaxel, F., Meyer, F.: A comparative study of LPWAN technologies for large-scale IoT deployment. ICT Express 5(1), 1–7 (2019)
Cisco: IoT to drive growth in connected devices through 2022. https://www.zdnet.com/article/iot-to-drive-growth-in-connected-devices-through-2022-cisco/. Accessed 26 July 2019
Cold in Finland: Five nightmarish attacks that show the risks of IoT security. https://www.zdnet.com/article/5-nightmarish-attacks-that-show-the-risks-of-iot-security/. Accessed 26 July 2019
Mirai-Botnet: Mirai Botnet DDoS. https://www.zdnet.com/article/5-nightmarish-attacks-that-show-the-risks-of-iot-security/. Accessed 26 July 2019
Passos, L., et al.: A study of feature scattering in the Linux kernel. IEEE Trans. Softw. Eng. (2018)
Gershuni, E., et al.: Simple and precise static analysis of untrusted Linux kernel extensions. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 1069–1084. ACM (2019)
Krčo, S., Pokrić, B., Carrez, F.: Designing IoT architecture(s): a European perspective. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 79–84. IEEE (2014)
Radanliev, P., De Roure, D., Nicolescu, R., Huth, M.: A reference architecture for integrating the industrial Internet of Things in the industry 4.0. arXiv preprint arXiv:1903.04369 (2019)
Airehrour, D., Gutierrez, J.A., Ray, S.K.: SecTrust-RPL: a secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 93, 860–876 (2019)
Raoof, A., Matrawy, A., Lung, C.H.: Routing attacks and mitigation methods for RPL-based Internet of Things. IEEE Commun. Surv. Tutor. 21(2), 1582–1606 (2018)
Zikria, Y.B., Afzal, M.K., Ishmanov, F., Kim, S.W., Yu, H.: A survey on routing protocols supported by the Contiki Internet of Things operating system. Future Gener. Comput. Syst. 82, 200–219 (2018)
IoT-Simulator: Cooja. https://anrg.usc.edu/contiki/index.php/CoojaSimulator. Accessed 29 July 2019
Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in cloud. J. Netw. Comput. Appl. 36(1), 42–57 (2013)
Butun, I., Morgera, S.D., Sankar, R.: A survey of intrusion detection systems in wireless sensor networks. IEEE Commun. Surv. Tutor. 16(1), 266–282 (2013)
Khandelwal, M., Gupta, D.K., Bhale, P.: DoS attack detection technique using back propagation neural network. In: 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 1064–1068. IEEE (2016)
Agrawal, N., Pradeepkumar, B., Tapaswi, S.: Preventing ARP spoofing in WLAN using SHA-512. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1–5. IEEE (2013)
Anantvalee, T., Wu, J.: A survey on intrusion detection in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.Z. (eds.) Wireless Network Security. SCT, pp. 159–180. Springer, Boston (2007). https://doi.org/10.1007/978-0-387-33112-6_7
Le, A., Loo, J., Luo, Y., Lasebae, A.: Specification-based IDS for securing RPL from topology attacks. In: 2011 IFIP Wireless Days (WD), pp. 1–3. IEEE (2011)
Wallgren, L., Raza, S., Voigt, T.: Routing attacks and countermeasures in the RPL-based internet of things. Int. J. Distrib. Sens. Netw. 9(8), 794326 (2013)
Pongle, P., Chavan, G.: A survey: attacks on RPL and 6LoWPAN in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pp. 1–6. IEEE (2015)
Cervantes, C., Poplade, D., Nogueira, M., Santos, A.: Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 606–611. IEEE (2015)
Glissa, G., Rachedi, A., Meddeb, A.: A secure routing protocol based on RPL for Internet of Things. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1–7. IEEE (2016)
Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J. 4(6), 2129–2141 (2017)
Raoof, A., Matrawy, A., Lung, C.H.: Secure routing in IoT: evaluation of RPL secure mode under attacks. arXiv preprint arXiv:1905.10314 (2019)
Kamble, A., Malemath, V.S., Patil, D.: Security attacks and secure routing protocols in RPL-based Internet of Things: survey. In: 2017 International Conference on Emerging Trends and Innovation in ICT (ICEI), pp. 33–39. IEEE (2017)
Raza, S., Wallgren, L., Voigt, T.: SVELTE: real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 11(8), 2661–2674 (2013)
Thamilarasu, G., Chawla, S.: Towards deep-learning-driven intrusion detection for the Internet of Things. Sensors 19(9), 1977 (2019)
Acknowledgments
We thank the anonymous reviewers for their helpful feedback that served to improve this paper. The research work has been conducted under Information Security Education and Awareness (ISEA) Project Phase - II. The authors would like to thank MeitY and IIT Guwahati India, for the support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Bhale, P., Dey, S., Biswas, S., Nandi, S. (2020). Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network. In: Rautaray, S., Eichler, G., Erfurth, C., Fahrnberger, G. (eds) Innovations for Community Services. I4CS 2020. Communications in Computer and Information Science, vol 1139. Springer, Cham. https://doi.org/10.1007/978-3-030-37484-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-37484-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37483-9
Online ISBN: 978-3-030-37484-6
eBook Packages: Computer ScienceComputer Science (R0)