Abstract
In the upcoming future, the Internet of Things (IoT) network will take over billions of devices which are connected to each other through the Internet using IPv6 protocol. To connect the devices with each other and the Internet concept is going to be of enormous importance and highlighting aspect. Devices connected in IoT are resource constrained in terms of processing power, memory, battery life, etc. Because of these characteristics, IoT network is very prone to security invasions. We are mainly concentrating on wormhole attack, one of the major and severe attacks occurring at a network layer of IoT protocol stack. RPL along with 6LoWPAN are two major designed protocols for constrained devices in IoT. We have executed an Intrusion Detection System (IDS) which perceives the said attack and attacker using Contiki OS and Cooja simulator. We have successfully experimented the system to find true positive detection rate for detecting the wormhole attack and attackers. We have efficiently received better results for various topologies in the implemented system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams Over IEEE 802.15.4-Based Networks, RFC 6282, September (2011)
Kothmayr, T., Hu, W., Schmitt, C., Bruenig, M., Carle, G.: Securing the internet of things with DTLS. In: Proceedings of the 9th ACM, Conference on Embedded Networked Sensor Systems, pp. 345–346. ACM (2011)
Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T., Roedig, U.: Securing communication in 6LoWPAN with compressed IPsec. In: 7th International Conference on Distributed Computing in Sensor Systems (DCOSS’11), Barcelona, Spain, pp. 1–8 (2011)
Raza, S., Duquennoy, S., Höglund, J., Roedig, U., Voigt, T.: Secure Communication for the Internet of Things—A Comparison of Link Layer Security and IPsec for 6LoWPAN, Security and Communication Networks. Wiley (2014). http://dx.doi.org/10.1002/sec.406
Shelby, Z., Kartke, K., Bormann, C., Frank, B.: Constrained Application Protocol (CoAP), draft-ietf-core-coap-12, October (2012)
Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550, March (2012)
Deshmukh, S., Sonavane, S.S.: Security Protocols for internet of Things: A Survey. ICNETS2, VIT University, Chennai (2017). 978-1-5090-5913-3/17/$31.00_c 2017 IEEE. https://doi.org/10.1109/icnets2.2017.8067900
Deshmukh-Bhosale, S., Sonavane, S.S.: Security Threats in 6LoWPAN and RPL Network: Mitigation Techniques and Design of IDS. In: IEEE Sponsored International Conference, August, ICCUBEA, Pune (2017)
Johnson, M.O., Siddiqui, A., Karami, A.: A wormhole attack detection and prevention technique in wireless sensor networks. Int. J. Comput. Appl. (0975–8887), 174(4) (2017)
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014). https://link.springer.com/article/10.1007/s11276-014-0761-7
Weber, R.H.: Internet of Things—new security and privacy challenges (2010). https://doi.org/10.1016/j.clsr.2009.11.008. Published by Elsevier Ltd.
Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals, RFC 4919, August (2007)
Airehrour, D., Gutierrez, J., Ray, S.K.: Secure Routing for Internet of Things: A Survey. J. Netw. Comput. Appl. (2016). http://dx.doi.org/10.1016/j.jnca.2016.03.006
Raza, S., Wallgren, L., Voigt, T.: SVELTE: Real-Time Intrusion Detection in the Internet of Things. Ad hoc Netw. 11(8), 2661–2674 (2013)
Ghosal, A., Halder, S.: A survey on energy efficient intrusion detection in wireless sensor networks. J. Ambient. Intell. Smart Environ. 9, 239–261 (2017). https://doi.org/10.3233/AIS-170426
Le, A., Loo, J., Chai, K., Aiash, M.: A specification-based IDS for detecting attacks on RPL-based network topology. Information 7, 25 (2016). https://doi.org/10.3390/info7020025
Azer, M., El-Kassas, S., El-Soudani, M.: A full of the wormhole attack. Int. J. Comput. Sci. Inf. Secur. (2009)
Dunkels, A., Grönvall, B., Voigt, T.: Contiki—a lightweight and flexible operating system for tiny networked sensors. In: EMNets’04, Tampa, USA, pp. 455–462 (2004)
Gonizzi, P., Duquennoy, S.: Hands on Contiki OS and Cooja Simulator: Exercises (Part II). https://team.inria.fr/fun/files/2014/04/slides_partI.pdf (2013). Accessed 10 Nov 2017
Texas Instruments: CC2420 Simple Linkâ„¢ Multi standard Wireless MCUl. http://www.ti.com/lit/ds/symlink/cc2420.pdf (2016). Accessed 13 Jan 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Deshmukh-Bhosale, S., Sonavane, S.S. (2020). Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things. In: Pati, B., Panigrahi, C., Buyya, R., Li, KC. (eds) Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 1082. Springer, Singapore. https://doi.org/10.1007/978-981-15-1081-6_44
Download citation
DOI: https://doi.org/10.1007/978-981-15-1081-6_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1080-9
Online ISBN: 978-981-15-1081-6
eBook Packages: EngineeringEngineering (R0)