采用键控哈希算法、顺序概率比测试和温度比较测试作为物联网wsn节点捕获攻击的安全防护

Q3 Engineering
Jhon Aron F. Varca, Earl Nestor T. Velasquez, Joseph Bryan G. Ibarra
{"title":"采用键控哈希算法、顺序概率比测试和温度比较测试作为物联网wsn节点捕获攻击的安全防护","authors":"Jhon Aron F. Varca, Earl Nestor T. Velasquez, Joseph Bryan G. Ibarra","doi":"10.12720/jcm.16.11.500-507","DOIUrl":null,"url":null,"abstract":"The emergence of IoT opened new opportunities for development in various fields. With all the information that it gathers, it became an interesting target for multiple attackers. Thus, this study will enforce security solutions to IoT-based devices specifically in the perception layer by incorporating a Temperature Comparison Test, Keyed Hash Algorithm and evaluating it using SPRT especially in the defense against malicious activities detected in the nodes of a network namely for Mobile and Immobile attacks. For immobile attacks, using the keyed hash algorithm and the SPRT, the hash key of the passcodes was compared to determine the safety of the nodes. Hence, from the functionality test that was conducted, and evaluating the data gathered using SPRT and Bernoulli’s equation, the reliability of the protocol to detect Immobile attacks is concluded to have a 100% detection rate. For mobile node attacks, the study assumes the environment to be under normal, warm, and cold room temperatures. where both mobile and without mobile attack is simulated, the result shows that there is only an overall 3% difference from the temperature measure by the sensor to the ambient temperature. Hence, combining these protocols that are applied in the study eliminates the single points of failure in the nodes that are either applicable only to a distributed scheme or mobility support, the study also compared the tested protocol to the other existing protocols.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"16 1","pages":"500-507"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Employing Keyed Hash Algorithm, Sequential Probability Ratio Test, and Temperature Comparison Test as Security Against Node Capture Attacks of IoT-Based WSNs\",\"authors\":\"Jhon Aron F. Varca, Earl Nestor T. Velasquez, Joseph Bryan G. Ibarra\",\"doi\":\"10.12720/jcm.16.11.500-507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emergence of IoT opened new opportunities for development in various fields. With all the information that it gathers, it became an interesting target for multiple attackers. Thus, this study will enforce security solutions to IoT-based devices specifically in the perception layer by incorporating a Temperature Comparison Test, Keyed Hash Algorithm and evaluating it using SPRT especially in the defense against malicious activities detected in the nodes of a network namely for Mobile and Immobile attacks. For immobile attacks, using the keyed hash algorithm and the SPRT, the hash key of the passcodes was compared to determine the safety of the nodes. Hence, from the functionality test that was conducted, and evaluating the data gathered using SPRT and Bernoulli’s equation, the reliability of the protocol to detect Immobile attacks is concluded to have a 100% detection rate. For mobile node attacks, the study assumes the environment to be under normal, warm, and cold room temperatures. where both mobile and without mobile attack is simulated, the result shows that there is only an overall 3% difference from the temperature measure by the sensor to the ambient temperature. Hence, combining these protocols that are applied in the study eliminates the single points of failure in the nodes that are either applicable only to a distributed scheme or mobility support, the study also compared the tested protocol to the other existing protocols.\",\"PeriodicalId\":53518,\"journal\":{\"name\":\"Journal of Communications\",\"volume\":\"16 1\",\"pages\":\"500-507\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12720/jcm.16.11.500-507\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12720/jcm.16.11.500-507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0

摘要

物联网的出现为各个领域的发展带来了新的机遇。有了它收集的所有信息,它成为了多个攻击者的一个有趣的目标。因此,本研究将对基于物联网的设备实施安全解决方案,特别是在感知层,通过结合温度比较测试、密钥哈希算法并使用SPRT评估它,特别是在防御网络节点中检测到的恶意活动时,即针对移动和非移动攻击。对于不可移动攻击,使用键控哈希算法和SPRT,比较密码的哈希密钥,以确定节点的安全性。因此,通过所进行的功能测试,并对SPRT和伯努利方程收集的数据进行评估,可以得出协议检测Immobile攻击的可靠性为100%。对于移动节点攻击,本研究假设环境在正常、温暖和寒冷的室温下。在模拟移动攻击和非移动攻击的情况下,结果表明,传感器测量的温度与环境温度之间只有3%的总体差异。因此,结合研究中应用的这些协议,消除了仅适用于分布式方案或移动性支持的节点中的单点故障,研究还将测试的协议与其他现有协议进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Employing Keyed Hash Algorithm, Sequential Probability Ratio Test, and Temperature Comparison Test as Security Against Node Capture Attacks of IoT-Based WSNs
The emergence of IoT opened new opportunities for development in various fields. With all the information that it gathers, it became an interesting target for multiple attackers. Thus, this study will enforce security solutions to IoT-based devices specifically in the perception layer by incorporating a Temperature Comparison Test, Keyed Hash Algorithm and evaluating it using SPRT especially in the defense against malicious activities detected in the nodes of a network namely for Mobile and Immobile attacks. For immobile attacks, using the keyed hash algorithm and the SPRT, the hash key of the passcodes was compared to determine the safety of the nodes. Hence, from the functionality test that was conducted, and evaluating the data gathered using SPRT and Bernoulli’s equation, the reliability of the protocol to detect Immobile attacks is concluded to have a 100% detection rate. For mobile node attacks, the study assumes the environment to be under normal, warm, and cold room temperatures. where both mobile and without mobile attack is simulated, the result shows that there is only an overall 3% difference from the temperature measure by the sensor to the ambient temperature. Hence, combining these protocols that are applied in the study eliminates the single points of failure in the nodes that are either applicable only to a distributed scheme or mobility support, the study also compared the tested protocol to the other existing protocols.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Journal of Communications
Journal of Communications Engineering-Electrical and Electronic Engineering
CiteScore
3.40
自引率
0.00%
发文量
29
期刊介绍: JCM is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, systems, methods, algorithms and applications in communications. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on communications. All papers will be blind reviewed and accepted papers will be published monthly which is available online (open access) and in printed version.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信