101. MalNoD: Malicous Node Discovery in Internet-of-Things through Fingerprints
- Author
-
Mostafa A. Salama, Aliaa Walid, and Ahmad Mostafa
- Subjects
Routing protocol ,business.industry ,Computer science ,Node (networking) ,Fingerprint (computing) ,Routing algorithm ,Denial-of-service attack ,Routing (electronic design automation) ,business ,Internet of Things ,Computer network ,Data transmission - Abstract
Internet of things (IoT) is becoming widely adopted in our daily lives. These devices range from basic sensors to very powerful and capable computing devices. However, there are many security issues associated with IoT. One major attack that is associated with IoT devices is the Denial of Service (DoS) attacks. In order to circumvent this attack, reliable and secure data transfer over the network is required. In this paper we introduce a secure distributed routing algorithm that aims to detect malicious nodes with a network. This is achieved by validating the source of the data being transmitted over the network through providing a fingerprint from the IoT device. The fingerprint is composed from data from the sensors already existing in the IoT device. Since these devices are not in an identical physical location, the fingerprint will vary from one device to another. We test our system on an implementation of a network of IoT devices and validate the results. Moreover, we provide simulation results for the secure routing protocol. Our implementation and simulation indicate that providing a fingerprint for the IoT devices and using it to provide secure routing will help avoid DoS attacks.
- Published
- 2017
- Full Text
- View/download PDF