Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the upcoming future, the Internet of Things (IoT) network will take over billions of devices which are connected to each other through the Internet using IPv6 protocol. To connect the devices with each other and the Internet concept is going to be of enormous importance and highlighting aspect. Devices connected in IoT are resource constrained in terms of processing power, memory, battery life, etc. Because of these characteristics, IoT network is very prone to security invasions. We are mainly concentrating on wormhole attack, one of the major and severe attacks occurring at a network layer of IoT protocol stack. RPL along with 6LoWPAN are two major designed protocols for constrained devices in IoT. We have executed an Intrusion Detection System (IDS) which perceives the said attack and attacker using Contiki OS and Cooja simulator. We have successfully experimented the system to find true positive detection rate for detecting the wormhole attack and attackers. We have efficiently received better results for various topologies in the implemented system.

Cite

CITATION STYLE

APA

Deshmukh-Bhosale, S., & Sonavane, S. S. (2020). Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things. In Advances in Intelligent Systems and Computing (Vol. 1082, pp. 513–523). Springer. https://doi.org/10.1007/978-981-15-1081-6_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free