scholarly journals A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things

Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 23
Author(s):  
Noshina Tariq ◽  
Muhammad Asim ◽  
Farrukh Aslam Khan ◽  
Thar Baker ◽  
Umair Khalid ◽  
...  

A multitude of smart things and wirelessly connected Sensor Nodes (SNs) have pervasively facilitated the use of smart applications in every domain of life. Along with the bounties of smart things and applications, there are hazards of external and internal attacks. Unfortunately, mitigating internal attacks is quite challenging, where network lifespan (w.r.t. energy consumption at node level), latency, and scalability are the three main factors that influence the efficacy of security measures. Furthermore, most of the security measures provide centralized solutions, ignoring the decentralized nature of SN-powered Internet of Things (IoT) deployments. This paper presents an energy-efficient decentralized trust mechanism using a blockchain-based multi-mobile code-driven solution for detecting internal attacks in sensor node-powered IoT. The results validate the better performance of the proposed solution over existing solutions with 43.94% and 2.67% less message overhead in blackhole and greyhole attack scenarios, respectively. Similarly, the malicious node detection time is reduced by 20.35% and 11.35% in both blackhole and greyhole attacks. Both of these factors play a vital role in improving network lifetime.

Author(s):  
Sivaganesan D

Utilization of smart applications in various domains is facilitated pervasively by sensor nodes (SN) that are connected in a wireless manner and a number of smart things. Hazards due to internal and external attacks exist along with the advantages of the smart things and its applications. Security measures are influenced by three main factors namely scalability, latency and network lifespan, without which mitigation of internal attacks is a challenge. The deployment of SN based Internet of things (IoT) is decentralized in nature. However, centralized solutions and security measures are provided by most researchers. A data driven trust mechanism based on blockchain is presented in this paper as a decentralized and energy efficient solution for detection of internal attacks in IoT powered SNs. In grey and black hole attack settings, the message overhead is improved using the proposed model when compared to the existing solutions. In both grey and black hole attacks, the time taken for detection of malicious nodes is also reduced considerably. The network lifetime is improved significantly due to the enhancement of these factors.


2019 ◽  
Vol 134 ◽  
pp. 198-206 ◽  
Author(s):  
Noshina Tariq ◽  
Muhammad Asim ◽  
Zakaria Maamar ◽  
M. Zubair Farooqi ◽  
Noura Faci ◽  
...  

2019 ◽  
Vol 8 (3) ◽  
pp. 1197-1203

The internet of things is the self-configuring type of network in which sensor nodes join or leave the network. The version number is the active type of attack possible in DODAG protocol of IoT. The Shield technique is proposed in the previous research work for the mitigation of version number attack in the network. It is very much complex for the detection of malicious nodes. In this research work, the trust based mechanism is proposed for the isolation of version number attack. The trust based mechanism calculates trust of each sensor node. The sensor nodes with the least trust are identified from the network as malicious nodes. The proposed mechanism is implemented in network simulator version 2. The trust based mechanism and shied based techniques are implemented and results are analyzed in terms of throughput, delay, control message overhead and average power consumption. It is analyzed that in terms of all parameters trust mechanism performs well as compared to shield based technique


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2021 ◽  
Vol 24 (3) ◽  
pp. 5-8
Author(s):  
Kai Geissdoerfer ◽  
Mikołaj Chwalisz ◽  
Marco Zimmerling

Collaboration of batteryless devices is essential to their success in replacing traditional battery-based systems. Without significant energy storage, spatio-temporal fluctuations of ambient energy availability become critical for the correct functioning of these systems. We present Shepherd, a testbed for the batteryless Internet of Things (IoT) that can record and reproduce spatio-temporal characteristics of real energy environments to obtain insights into the challenges and opportunities of operating groups of batteryless sensor nodes.


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Federica Paganelli ◽  
David Parlanti

Current trends towards the Future Internet are envisaging the conception of novel services endowed with context-aware and autonomic capabilities to improve end users’ quality of life. The Internet of Things paradigm is expected to contribute towards this ambitious vision by proposing models and mechanisms enabling the creation of networks of “smart things” on a large scale. It is widely recognized that efficient mechanisms for discovering available resources and capabilities are required to realize such vision. The contribution of this work consists in a novel discovery service for the Internet of Things. The proposed solution adopts a peer-to-peer approach for guaranteeing scalability, robustness, and easy maintenance of the overall system. While most existing peer-to-peer discovery services proposed for the IoT support solely exact match queries on a single attribute (i.e., the object identifier), our solution can handle multiattribute and range queries. We defined a layered approach by distinguishing three main aspects: multiattribute indexing, range query support, peer-to-peer routing. We chose to adopt an over-DHT indexing scheme to guarantee ease of design and implementation principles. We report on the implementation of a Proof of Concept in a dangerous goods monitoring scenario, and, finally, we discuss test results for structural properties and query performance evaluation.


2011 ◽  
Vol 57 (3) ◽  
pp. 341-346 ◽  
Author(s):  
Safdar Khan ◽  
Boubaker Daachi ◽  
Karim Djouani

Overcoming Localization Errors due to Node Power Drooping in a Wireless Sensor NetworkReceived Signal Strength Indication (RSSI) plays a vital role in the range-free localization of sensor nodes in a wireless sensor network and a good amount of research has been made in this regard. One important factor is the battery voltage of the nodes (i.e., the MICAz sensors) which is not taken into account in the existing literature. As battery voltage level performs an indispensable role for the position estimation of sensor nodes through anchor nodes therefore, in this paper, we take into a account this crucial factor and propose an algorithm that overcomes the problem of decaying battery. We show the results, in terms of more precise localization of sensor nodes through simulation. This work is an extension to [1] and now we also use neural network to overcome the localization errors generated due to gradual battery voltage drooping.


Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 7449
Author(s):  
Fangqiuzi He ◽  
Junfeng Xu ◽  
Jinglin Zhong ◽  
Guang Chen ◽  
Shixin Peng

In order to realize the intelligent management of a power materials warehouse, the Internet of Things based on wireless sensor networks (WSNs) is a promising effective solution. Considering the limited battery capacity of sensor nodes, the optimization of the topology control and the determination of the amount of collected data are critical for prolonging the survival time of WSNs and increasing the satisfaction of the warehouse supplier. Therefore, in this paper, an optimization problem on sensor association and acquisition data satisfaction is proposed, and the subproblem of the sensor association is modeled as the knapsack problem. To cope with it, the block coordinate descent method is used to obtain the suboptimal solution. A sensor association scheme based on the ant colony algorithm (ACO) is proposed, and the upper and lower bounds of this optimization problem are also obtained. After this, a cluster head selection algorithm is given to find the optimal cluster head. Finally, the experimental simulations show that the algorithms proposed in this paper can effectively improve the energy utilization of WSNs to ensure the intelligent management of a power materials warehouse.


Sign in / Sign up

Export Citation Format

Share Document