Skip to main content

Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things

  • Conference paper
  • First Online:
Advanced Computing and Intelligent Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1082))

Abstract

In the upcoming future, the Internet of Things (IoT) network will take over billions of devices which are connected to each other through the Internet using IPv6 protocol. To connect the devices with each other and the Internet concept is going to be of enormous importance and highlighting aspect. Devices connected in IoT are resource constrained in terms of processing power, memory, battery life, etc. Because of these characteristics, IoT network is very prone to security invasions. We are mainly concentrating on wormhole attack, one of the major and severe attacks occurring at a network layer of IoT protocol stack. RPL along with 6LoWPAN are two major designed protocols for constrained devices in IoT. We have executed an Intrusion Detection System (IDS) which perceives the said attack and attacker using Contiki OS and Cooja simulator. We have successfully experimented the system to find true positive detection rate for detecting the wormhole attack and attackers. We have efficiently received better results for various topologies in the implemented system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams Over IEEE 802.15.4-Based Networks, RFC 6282, September (2011)

    Google Scholar 

  2. Kothmayr, T., Hu, W., Schmitt, C., Bruenig, M., Carle, G.: Securing the internet of things with DTLS. In: Proceedings of the 9th ACM, Conference on Embedded Networked Sensor Systems, pp. 345–346. ACM (2011)

    Google Scholar 

  3. Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: 7th International Conference on Distributed Computing in Sensor Systems (DCOSS’11), Barcelona, Spain, pp. 1–8 (2011)

    Google Scholar 

  4. Raza, S., Duquennoy, S., Höglund, J., Roedig, U., Voigt, T.: Secure Communication for the Internet of Things—A Comparison of Link Layer Security and IPsec for 6LoWPAN, Security and Communication Networks. Wiley (2014). http://dx.doi.org/10.1002/sec.406

  5. Shelby, Z., Kartke, K., Bormann, C., Frank, B.: Constrained Application Protocol (CoAP), draft-ietf-core-coap-12, October (2012)

    Google Scholar 

  6. Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550, March (2012)

    Google Scholar 

  7. Deshmukh, S., Sonavane, S.S.: Security Protocols for internet of Things: A Survey. ICNETS2, VIT University, Chennai (2017). 978-1-5090-5913-3/17/$31.00_c 2017 IEEE. https://doi.org/10.1109/icnets2.2017.8067900

  8. Deshmukh-Bhosale, S., Sonavane, S.S.: Security Threats in 6LoWPAN and RPL Network: Mitigation Techniques and Design of IDS. In: IEEE Sponsored International Conference, August, ICCUBEA, Pune (2017)

    Google Scholar 

  9. Johnson, M.O., Siddiqui, A., Karami, A.: A wormhole attack detection and prevention technique in wireless sensor networks. Int. J. Comput. Appl. (0975–8887), 174(4) (2017)

    Google Scholar 

  10. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014). https://link.springer.com/article/10.1007/s11276-014-0761-7

  11. Weber, R.H.: Internet of Things—new security and privacy challenges (2010). https://doi.org/10.1016/j.clsr.2009.11.008. Published by Elsevier Ltd.

  12. Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, RFC 4919, August (2007)

    Google Scholar 

  13. Airehrour, D., Gutierrez, J., Ray, S.K.: Secure Routing for Internet of Things: A Survey. J. Netw. Comput. Appl. (2016). http://dx.doi.org/10.1016/j.jnca.2016.03.006

  14. Raza, S., Wallgren, L., Voigt, T.: SVELTE: Real-Time Intrusion Detection in the Internet of Things. Ad hoc Netw. 11(8), 2661–2674 (2013)

    Google Scholar 

  15. Ghosal, A., Halder, S.: A survey on energy efficient intrusion detection in wireless sensor networks. J. Ambient. Intell. Smart Environ. 9, 239–261 (2017). https://doi.org/10.3233/AIS-170426

    Article  Google Scholar 

  16. Le, A., Loo, J., Chai, K., Aiash, M.: A specification-based IDS for detecting attacks on RPL-based network topology. Information 7, 25 (2016). https://doi.org/10.3390/info7020025

    Article  Google Scholar 

  17. Azer, M., El-Kassas, S., El-Soudani, M.: A full of the wormhole attack. Int. J. Comput. Sci. Inf. Secur. (2009)

    Google Scholar 

  18. Dunkels, A., Grönvall, B., Voigt, T.: Contiki—a lightweight and flexible operating system for tiny networked sensors. In: EMNets’04, Tampa, USA, pp. 455–462 (2004)

    Google Scholar 

  19. Gonizzi, P., Duquennoy, S.: Hands on Contiki OS and Cooja Simulator: Exercises (Part II). https://team.inria.fr/fun/files/2014/04/slides_partI.pdf (2013). Accessed 10 Nov 2017

  20. Texas Instruments: CC2420 Simple Linkâ„¢ Multi standard Wireless MCUl. http://www.ti.com/lit/ds/symlink/cc2420.pdf (2016). Accessed 13 Jan 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Snehal Deshmukh-Bhosale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deshmukh-Bhosale, S., Sonavane, S.S. (2020). Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things. In: Pati, B., Panigrahi, C., Buyya, R., Li, KC. (eds) Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 1082. Springer, Singapore. https://doi.org/10.1007/978-981-15-1081-6_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1081-6_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1080-9

  • Online ISBN: 978-981-15-1081-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics