Mitigação de Ataques no Roteamento em IoT Densa e Móvel Baseada em Agrupamento e Confiabilidade dos Dispositivos

  • Christian Cervantes UFPR
  • Michele Nogueira UFPR
  • Aldri Santos UFPR

Resumo


Entre os desafios à implantação da IoT está sua vulnerabilidade a várias formas de ataques de roteamento por possuir uma infraestrutura variável, recursos computacionais distintos, e ser uma rede aberta e com objetos heterogêneos móveis. Os ataques sinkhole e selective forwarding destacam-se entre os mais destrutivos aos sistemas em redes não estruturadas. Embora os atuais sistemas de detecção de intrusão (IDS) sejam uma boa contramedida de proteção das redes e sistemas de disseminação de dados contra ataques na IoT, eles possuem diversas restrições de custos e desempenho. Este artigo propõe um sistema de detecção de intrusão contra ataques sinkhole e selective forwarding sobre o roteamento na IoT densa e móvel. O sistema, chamado Thatachi, utiliza agrupamento para lidar com a densidade e a mobilidade, e combina estratégias de watchdog, reputação e confiança na detecção de atacantes, a fim de garantir confiabilidade aos dispositivos. A avaliação do Thatachi no simulador Cooja mostrou sua eficácia na mitigação dos ataques e seu baixo consumo de recursos.

Referências

Accettura, N., Grieco, L. A., Boggia, G., and Camarda, P. (2011). Performance analysis of the rpl routing protocol. In Mechatronics (ICM), 2011 IEEE International Conference on, pages 767–772. IEEE.

Adat, V. and Gupta, B. (2017). Security in internet of things: issues, challenges, taxonomy, and architecture. Telecommunication Systems, pages 1–19.

Airehrour, D., Gutierrez, J., Ray, S. K., et al. (2017). A trust-aware rpl routing protocol to detect blackhole and selective forwarding attacks. Australian Journal of Telecommunications and the Digital Economy, 5(1):50.

Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15):2787–2805.

Bari, N., Mani, G., and Berkovich, S. (2013). Internet of things as a methodological concept. In Fourth International Conference on Computing for Geospatial Research and Application (COM. Geo), 2013, pages 48–55. IEEE.

Borgia, E. (2014). The internet of things vision: key features, applications and open issues. Computer Networks, 54:1–31.

Cervantes, C., Poplade, D., Nogueira, M., and Santos, A. (2015). Detection of sinkhole attacks for supporting secure routing on 6lowpan for internet of In IFIP/IEEE International Symposium on Integrated Network Management things. (IM) 2015, pages 606–611. IEEE.

Dunkels, A., Gronvall, B., and Voigt, T. (2004). Contiki-a lightweight and exible operating system for tiny networked sensors. In 29th Annual IEEE International Conference on Local Computer Networks, 2004, pages 455–462. IEEE.

Hasan, M. M. and Mouftah, H. T. (2017). Optimization of watchdog selection in wireless sensor networks. IEEE Wireless Communications Letters, 6(1):94–97.

Kamble, A., Malemath, V. S., and Patil, D. (2017). Security attacks and secure routing protocols in rpl-based internet of things: Survey. In International Conference on Emerging Trends & Innovation in ICT (ICEI), 2017, pages 33–39. IEEE.

Khan, Z. A. and Herrmann, P. (2017). A trust based distributed In IEEE 31st Conference on intrusion detection mechanism for internet of things. Advanced Information Networking and Applications (AINA), 2017, pages 1169–1176.

Le, A., Loo, J., Chai, K. K., and Aiash, M. (2016). A specication-based ids for detecting attacks on rpl-based network topology. Information, 7(2):25.

Lima, M. N., Dos Santos, A. L., and Pujolle, G. (2009). A survey of survivability in mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 11(1):66–77.

Mathur, A., Newe, T., and Rao, M. (2016). Defence against black hole and selective forwarding attacks for medical wsns in the iot. Sensors, 16(1):118.

Sheikhan, M. and Bostani, H. (2017). A security mechanism for detecting intrusions in internet of things using selected features based on mi-bgsa. Int. Journal of Information & Communication Technology Research, 9(2):53–62.

Sicari, S., Rizzardi, A., Grieco, L. A., and Coen-Porisini, A. (2015). Security, privacy and trust in internet of things: The road ahead. Computer Networks, 76:146–164.

Sonar, S., Roy, D. B., Chakraborty, R. S., and Mukhopadhyay, D. (2016). Side-channel watchdog: Run-time evaluation of side-channel vulnerability in fpgabased crypto-systems. IACR Cryptology EPrint Archive, 2016:182.

Tang, H. (2015). A novel fuzzy soft set approach in decision making based on grey relational analysis and dempster–shafer theory of evidence. Applied Soft Computing, 31:317–325.

Thanigaivelan, N. K., Nigussie, E., Kanth, R. K., Virtanen, S., and Isoaho, J. (2016). Distributed internal anomaly detection system for internet-ofthings. In 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), 2016, pages 319–320. IEEE.

Yang, L., Ding, C., Wu, M., and Wang, K. (2017). Robust detection of false data injection attacks for the data aggregation in internet of things based environmental surveillance. Computer Networks.

Zarpelão, B. B., Miani, R. S., Kawakani, C. T., and de Alvarenga, S. C. (2017). A survey of intrusion detection in internet of things. Journal of Network and Computer Applications.
Publicado
10/05/2018
Como Citar

Selecione um Formato
CERVANTES, Christian; NOGUEIRA, Michele; SANTOS, Aldri. Mitigação de Ataques no Roteamento em IoT Densa e Móvel Baseada em Agrupamento e Confiabilidade dos Dispositivos. In: SIMPÓSIO BRASILEIRO DE REDES DE COMPUTADORES E SISTEMAS DISTRIBUÍDOS (SBRC), 36. , 2018, Campos do Jordão. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2018 . p. 712-725. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc.2018.2453.

Artigos mais lidos do(s) mesmo(s) autor(es)

1 2 3 > >>