scholarly journals Trust based Technique for the Mitigation of Version Number Attack in Internet of Things

2019 ◽  
Vol 8 (3) ◽  
pp. 1197-1203

The internet of things is the self-configuring type of network in which sensor nodes join or leave the network. The version number is the active type of attack possible in DODAG protocol of IoT. The Shield technique is proposed in the previous research work for the mitigation of version number attack in the network. It is very much complex for the detection of malicious nodes. In this research work, the trust based mechanism is proposed for the isolation of version number attack. The trust based mechanism calculates trust of each sensor node. The sensor nodes with the least trust are identified from the network as malicious nodes. The proposed mechanism is implemented in network simulator version 2. The trust based mechanism and shied based techniques are implemented and results are analyzed in terms of throughput, delay, control message overhead and average power consumption. It is analyzed that in terms of all parameters trust mechanism performs well as compared to shield based technique

2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


Author(s):  
Ritesh Awasthi ◽  
Navneet Kaur

The network across which the information is sensed by the sensor devices and then forwarded to the sink is known as Internet of Things (IoT). Even though this system is deployed in several applications, there are certain issues faced in it due to its dynamic nature. The internet of things is derived from the wireless sensor networks. The sensor nodes which are deployed to sense environmental conditions are very small in size and also deployed on the far places due to which energy consumption is the major issue of internet of things. This research work related to reduce energy consumption of the network so that lifetime can be improved. In the existing system the approach of multilevel clustering is used for the data aggregation to base station. In the approach of multilevel clustering, the whole network is divided into clusters and cluster heads are selected in each cluster. The energy efficient techniques of internet of things are reviewed and analyzed in terms of certain parameters.


2019 ◽  
Vol 8 (4) ◽  
pp. 3002-3007

The internet of things is the decentralized type of network in which sensor devices can join or leave the network when they want. Due to such nature of the network malicious nodes enter the network which affects network performance in terms of certain parameters. This research work is based on the detection and isolation of distributed denial of service attack in internet of things. The distributed denial of service attack is the denial of service type attack which affects network performance to large extent. In the existing techniques there are two main drawbacks. The first drawback is that the technique does not pin point malicious nodes from the network. The second drawback is that the malicious node detection time is very high. In this research, the new technique will be proposed for the isolation of malicious nodes from the network. In this technique, similarity of the traffic is analyzed using the cosine similarity. The sensor node which is generated dissimilar type of traffic is detected as malicious nodes. The proposed technique has been implemented in MATLAB and results have been analyzed in terms of certain parameters. It is expected that proposed technique detect malicious nodes in least amount of time.


2012 ◽  
Vol 197 ◽  
pp. 649-655
Author(s):  
Jian Hua Liu ◽  
Wei Qin Tong

Internet of things applications using RFID sensors are a challenging task due to the limited capacity of batteries. Thus, energy efficient updating and maintenance have become more critical design with RFID sensor network. This paper is dedicated to combine energy harvesting and maintenance, sensor network, and resource discovery to develop a rechargeable sensor energy maintenance scheme. To deal with key sensor nodes and low energy path maintenance, the proposed approach consists of the following:(1)key point energy maintenance for RFID sensor through multi-path similarity analysis;(2)path energy maintenance for RFID sink through energy resource discovery. Use case application and simulation results show that the proposed methods reduce key sensor nodes energy maintenance time and energy maintenance path length for sensor nodes energy updating and maintenance.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2468 ◽  
Author(s):  
Khalid Haseeb ◽  
Ahmad Almogren ◽  
Ikram Ud Din ◽  
Naveed Islam ◽  
Ayman Altameem

Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things (IoT) provides a great concern for the research community for enabling advanced services. An IoT network may comprise a large number of heterogeneous smart devices for gathering and forwarding huge data. Such diverse networks raise several research questions, such as processing, storage, and management of massive data. Furthermore, IoT devices have restricted constraints and expose to a variety of malicious network attacks. This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security. The proposed architecture comprises two main phases. Firstly, network nodes are grouped using unsupervised machine learning and exploit weighted-based centroid vectors for the development of intelligent systems. Secondly, the proposed architecture makes the use of sensor-cloud infrastructure for boundless storage and consistent service delivery. Furthermore, the sensor-cloud infrastructure is protected against malicious nodes by using a mathematically unbreakable one-time pad (OTP) encryption scheme to provide data security. To evaluate the performance of the proposed architecture, different simulation experiments are conducted using Network Simulator (NS3). It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission overhead.


Author(s):  
Zhiyao Fan ◽  
Tianhong Pan ◽  
Li Ma

In order to increase the management efficiency and decrease the maintenance costs in the traditional dust monitoring system, a novel real-time remote monitoring system using the Internet of Things and cloud server is proposed in this paper. The system includes several sensor nodes, a sink node and Cloud Server. The high-precision dust probe, temperature and humidity sensors, water flow sensors and hydrogen transmitters are integrated together into a sensor node to access the metal polished environmental information. Then, the collected information is transmitted to sink-node using the 2.4G wireless network. The sink-node uploads data to the Cloud Server through the 4G network and TCP Socket. Based on the Browser/Server (B/S) model, a remote monitoring system is developed by using Tencent Cloud Server, C# language, and SQL database. As a result, the on-site metal polishing environmental information is obtained via the App and Web page.


Author(s):  
Pallepati Vasavi ◽  
G Raja Ramesh

As per need of recent applications, new research aspects related to scalability, heterogeneity, and power consumption have been arisen. These problems are supposed to be fixed for better utilization of MANETs. MANET nodes interact through multi-hop routing. AODV is a commonly used on-demand protocol for routing in MANETs. In the existing literature, AODV has been analyzed a number of times but heterogeneity of the nodes has not been addressed. Heterogeneity may be defined as diversity among the nodes in resources or capability. The environment is usually heterogeneous in case of constraint fluid dynamic environment of MANET. In this paper we are analyzing the routing performance as well as energy efficient behavior of AODV routing protocol in both homogeneous and heterogeneous MANETs (H-MANETs), using performance parameters like ratio of delivered packets, throughput, average delay, average power consumption, energy of alive nodes, etc. Heterogeneity has been introduced in terms of different initial energy for all the nodes, unlike the homogeneous scenario. The simulation work has been done using network simulator (NS-2). This work will be helpful to get insight of effects of heterogeneity on energy efficiency and other performance metrics of AODV.


Author(s):  
Robert Cerna Duran ◽  
◽  
Brian Meneses Claudio ◽  
Alexi Delgado

The increase in garbage production today is due to the exponential growth of the population worldwide, due to the fact that thousands of tons of garbage are generated daily around the world, but the mismanagement that gives them has become an environmental problem since 33% of all the garbage generated is not recycled, for that reason it is estimated that within the next three decades the amount of waste worldwide will increase to 70%. That is why in the present research work it is proposed to make an intelligent system based on the Internet of Things (IoT) that allows monitoring the garbage containers in real time representing with percentages the state of these containers and these can be collected in time by garbage trucks, and thus avoid the increase of garbage in the streets and the various types of problems that these would cause. As a result, it was obtained that the System does comply with the established conditions because it allows to monitor in real time representing by percentages the state of the garbage container, which indicates 40% as almost full and 80% indicates that it is already available for collection. Finally, it is concluded that using the Garbage Container Monitoring System will allow to better optimize the collection process and, in addition, the problems that are usually perceived today due to the amount of garbage that are registered in the streets will decrease. Keywords-- Internet of Things; Intelligent system; Real time; Environmental Problem; Monitoror; Percentage.


2018 ◽  
Vol 65 (3) ◽  
pp. 37 ◽  
Author(s):  
Nataliia V. Morze ◽  
Mariia A. Gladun ◽  
Serhii M. Dziuba

The article deals with issues related to STEM-education; the modern views of STEM-education and peculiarities of the introduction of robotics as one of its branches in the educational process, its influence on the motivation of students; the need to prepare students for the skills of the twenty-first century through the introduction of STEM-education, starting with elementary school. The results of the survey conducted among teachers and future teachers in Ukraine on introduction of robotics in the educational process are presented. The results of the survey are demonstrated. It has shown that the study of robotics or its integration into educational subjects helps to stimulate the student's learning motivation, develops the ability to solve problems and improves their research work, gives children the opportunity to create their own product, and in this process express creative thinking. The problem of preparation of teachers for conducting classes using robots, their integration into educational subjects and the selection of robotic designers was explored. The kits for robotics classes for different age groups are described as well as demonstrated the capabilities of robotic kits and features of their application. The questions of implementation of robotics as a component of profile training are considered. The article focuses on the emergence of new professions related to the internet of things and, as a consequence, new specializations in higher education institutions. There are four courses on teaching the Internet of things that explain the components of the Internet of things and the interconnections between them. There is a conclusion about the effectiveness of using various training robotic kits. They can cover a wide area of educational objectives which form the skills of the 21st century.


Sign in / Sign up

Export Citation Format

Share Document