Loading…

Effective modelling of sinkhole detection algorithm for edge‐based Internet of Things (IoT) sensing devices

The sinkhole attacks for Internet of Things (IoT) situations can overcome the network and interrupt communication. Sinkhole attacker nodes can advertise the best possible shortest path towards the destination, and once the normal node starts transferring the packets by the given path, the attacker n...

Full description

Saved in:
Bibliographic Details
Published in:IET communications 2022-05, Vol.16 (8), p.845-855
Main Authors: Bilal, Ahmad, Hasany, Syed Muhammad Noman, Pitafi, Abdul Hameed
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The sinkhole attacks for Internet of Things (IoT) situations can overcome the network and interrupt communication. Sinkhole attacker nodes can advertise the best possible shortest path towards the destination, and once the normal node starts transferring the packets by the given path, the attacker node starts troublemaking the flow of the network. In this environment, the destination is unable to receive proper information or may not receive complete information. Sinkhole attacked network keeps the problems like the enhanced end‐to‐end delay, less throughput, and reduced packet delivery. Furthermore, it can affect other network constraints. So, it has become important to design an effective model to prevent the IoT environment from sinkhole attacks. In this article, an intrusion detection model is proposed to protect the IoT environment from sinkhole attacks. A model proposed by using rich resourced edge nodes to detect various kinds of sinkhole attacker nodes by exchanging messages. A well‐known NS2 simulator is used for the practical implementation of the model. The proposed model attains more than 95% detection rate with a near about 1.4% false‐positive rate, which seems better than previously given schemes. Finally, the proposed scheme is the appropriate match for a sensitive platform like a monitoring and security system.
ISSN:1751-8628
1751-8636
DOI:10.1049/cmu2.12385