The Prominent Key Role of Denial - of - Service in Intrusion Detection System for Internet of Things

Authors(2) :-G. Nanda Kishor Kumar, Dr. R. K. Sharma

There are currently more objects connected to the Internet than people in the world. This gap will continue to grow, as more objects gain the ability to directly interface with the Internet. Providing security in IoT is challenging as the devices are resource constrained, the communication links are loss, and the devices use a set of novel IoT technologies such as RPL and 6LoWPAN. Due to this it is easy to attack in IoT network. The proposed system is a novel intrusion detection system for the IoT, which is capable of detecting DoS attack and attacker. The proposed methods use the location information of node and neighbour information to identify the attack and received signal strength to identify attacker nodes. Design of such system will help in securing the IoT network and may prevents such attacks. This method is very energy efficient and only takes fixed number of UDP packets for attack detection; hence it is beneficial for resource constrained environment.

Authors and Affiliations

G. Nanda Kishor Kumar
Research Scholar, Department of CSE Sunrise University, Rajasthan, India
Dr. R. K. Sharma
Supervisor, Department of CSE, Sunrise University, Rajasthan, India

Internet of things, Intrusion Detection System, 6LoWPAN (IPv6 over low power personal area network), Denial of Service attack.

  1. Kasinathan, Prabhakaran, et al. "Denial-of-Service detection in 6LoWPAN based internet of things." Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on. IEEE, 2013.
  2. Pavan Pongle, Gurunath Chavan "Real time Intrusion Detection and Wormhole attack detection in internet of things", by International journal of Computer applications ,2015.
  3. "Contiki, the open source os for the internet of things." [Online] http://www.contiki-os.org/, Accessed May 2013.
  4. Raza, Shahid, Linus Wallgren, and Thiemo Voigt. "SVELTE: Real-time intrusion detection in the Internet of Things." Ad hoc networks 11.8 (2013): 2661-2674.
  5. Tejas mehare , Prof. Mrs. SnehalBhosale " Development of 6LoWPAN BORDER ROUTER for Secure Communication", International Journal of Advanced Research in Computer and Communication Engineering march 2017.
  6. Jun, Chen, and Chen Chi. "Design of Complex Event- Processing IDS in Internet of Things." Measuring Technology and Mechatronics Automation (ICMTMA), 2014 Sixth International Conference on. IEEE, 2014.
  7. A. Dunkels, J. Eriksson, N. Finne, N. Tsiftes, Powertrace: NetworkLevel Power Profiling for Low-Power Wireless Networks, 2011.
  8. Le, Anhtuan, et al. "The impacts of internal threats towards Routing Protocol for Low power and lossy network performance." Computers and Communications (ISCC), 2013 IEEE Symposium on. IEEE, 2013.
  9. Alessandro Sforzin and Mauro Conti " RPiDS: Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT", IEEE Conferences on Ubiquitous Intelligence & Computing,2016.
  10. A. Hassanzadeh, Z. Xu, R. Stoleru, G. Gu, and M. Polychronakis, "PRIDE: Practical intrusion detection in resource constrained wireless mesh networks," in Information and Communications Security. Springer, 2013, pp. 213–228.
  11. A. K. Kyaw, Y. Chen, and J. Joseph, "Pi-IDS: evaluation of opensource intrusion detection systems on Raspberry Pi 2," in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). IEEE, 2015, pp. 165–170. 12. D. Evans, "The internet of things: How the next evolution of the internet is changing everything," CISCO white paper, 2011.
  12. O. Garcia-Morchon, S. Kumar, R. Struik, S. Keoh, and R. Hummen, "Security considerations in the ip-based internet of things." IETF (work in progress) Available [Online] http://tools.ietf.org/html/draft-garciacore- security-05, Mar. 2013.
  13. H. Sedjelmaci and M. Feham, "Novel, Hybrid Intrusion Detection System for Clustered Wireless Sensor Network," International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011, vol. 3, no. 4, pp. 1–14, 2011.
  14. Ismail butun , Salvatore D. Morgera and Ravi sankar ,"A Survey of Intrusion Detection Systems in Wireless Sensor networks", IEEE Communications Survey and Tutorials ,2014.
  15. https://www.techopedia.com/definition/24841/denial-of-service-attack-dos

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2016
Date of Publication : 2016-11-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 548-554
Manuscript Number : IJSRST1841218
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

G. Nanda Kishor Kumar, Dr. R. K. Sharma, " The Prominent Key Role of Denial - of - Service in Intrusion Detection System for Internet of Things, International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 2, Issue 6 , pp.548-554, November-December-2016. Available at doi : 10.32628/IJSRST1841218
Journal URL : http://ijsrst.com/IJSRST1841218

Article Preview

Contact Us