Detecting and Preventing for Performance Assessment of IoT Devices Under Dodag Information Solicitation (dis) Attacks

Tamer Kamal, Emadeldin Helmy, Sherif Fahmy, M. H. Abd El-Azeem
{"title":"Detecting and Preventing for Performance Assessment of IoT Devices Under Dodag Information Solicitation (dis) Attacks","authors":"Tamer Kamal, Emadeldin Helmy, Sherif Fahmy, M. H. Abd El-Azeem","doi":"10.1109/NRSC58893.2023.10152999","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) is an important area of research as the ever-increasing number of connected devices permeate every aspect of our daily lives. The main characteristic of IoT devices is that they tend to be low resource devices, that are incapable of sustaining high power consumption activity for a long time, and they also tend to operate on lossy networks. Therefore, the term (Low Power and Lossy Networks - LLNs) is used in reference to such networks. The routing protocol used on IoT networks is typically RPL (Routing Protocol for Low-Power and Lossy Networks). These characteristics make IoT devices vulnerable to a variety of attacks; the most common of which are (DIS-DODAG Information Solicitation) attacks. This is a routing protocol attack that targets IoT resources, especially the battery of devices. This paper proposes a simulation and analysis of the DIS attack impact on the network performance in terms of energy consumption, as well as study the relationship between the number of attacker nodes and the IoT lifetime. We analyze number of attack scenarios to figure out the relationship between the number of attacker nodes and the power consumption among the IOT device and the reflect on its lifetime. We found that the power consumption inversely proportional with the number of attacker nodes as the power consumption increased by 212.374% with four attack nodes and by 650% with one attacker node and so the IOT life time decreased 2.21 times and 6.5 times respectively. We also proposed two novel algorithms for detecting and mitigating the DIS-attacks, and we simulate and evaluate them finding that they are very effective in stopping both slow/fast attacks and minimizing the false positives, as we simulated six attack scenarios with different attack rates and by studding the Attack Discover Performance we found that The system is Robust Enough to discover/stop high wave of Security intrusions.","PeriodicalId":129532,"journal":{"name":"2023 40th National Radio Science Conference (NRSC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 40th National Radio Science Conference (NRSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NRSC58893.2023.10152999","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) is an important area of research as the ever-increasing number of connected devices permeate every aspect of our daily lives. The main characteristic of IoT devices is that they tend to be low resource devices, that are incapable of sustaining high power consumption activity for a long time, and they also tend to operate on lossy networks. Therefore, the term (Low Power and Lossy Networks - LLNs) is used in reference to such networks. The routing protocol used on IoT networks is typically RPL (Routing Protocol for Low-Power and Lossy Networks). These characteristics make IoT devices vulnerable to a variety of attacks; the most common of which are (DIS-DODAG Information Solicitation) attacks. This is a routing protocol attack that targets IoT resources, especially the battery of devices. This paper proposes a simulation and analysis of the DIS attack impact on the network performance in terms of energy consumption, as well as study the relationship between the number of attacker nodes and the IoT lifetime. We analyze number of attack scenarios to figure out the relationship between the number of attacker nodes and the power consumption among the IOT device and the reflect on its lifetime. We found that the power consumption inversely proportional with the number of attacker nodes as the power consumption increased by 212.374% with four attack nodes and by 650% with one attacker node and so the IOT life time decreased 2.21 times and 6.5 times respectively. We also proposed two novel algorithms for detecting and mitigating the DIS-attacks, and we simulate and evaluate them finding that they are very effective in stopping both slow/fast attacks and minimizing the false positives, as we simulated six attack scenarios with different attack rates and by studding the Attack Discover Performance we found that The system is Robust Enough to discover/stop high wave of Security intrusions.
数据请求攻击下物联网设备性能评估的检测与预防
物联网(IoT)是一个重要的研究领域,因为越来越多的连接设备渗透到我们日常生活的方方面面。物联网设备的主要特征是它们往往是低资源设备,无法长时间维持高功耗活动,并且它们也倾向于在有损网络上运行。因此,术语(低功耗和有损网络- lln)被用来指代这种网络。物联网网络中使用的路由协议通常是RPL(低功耗和有损网络路由协议)。这些特征使物联网设备容易受到各种攻击;其中最常见的是(DIS-DODAG信息请求)攻击。这是一种针对物联网资源(尤其是设备电池)的路由协议攻击。本文从能耗方面仿真分析了DIS攻击对网络性能的影响,并研究了攻击者节点数量与物联网生命周期的关系。通过对攻击场景数量的分析,得出攻击节点数量与物联网设备之间功耗的关系,以及对物联网设备寿命的影响。我们发现,功耗与攻击节点数成反比,4个攻击节点时功耗增加212.374%,1个攻击节点时功耗增加650%,因此物联网寿命分别减少2.21倍和6.5倍。我们还提出了两种用于检测和减轻diss攻击的新算法,并对它们进行了模拟和评估,发现它们在阻止慢速/快速攻击和最小化误报方面非常有效,因为我们模拟了具有不同攻击率的六种攻击场景,并通过研究攻击发现性能,我们发现该系统具有足够的鲁棒性来发现/阻止高波安全入侵。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信