RAD-EI:Aroutingattackdetectionschemeforedge-based InternetofThingsenvironment

Wazid, Mohammed and Dsouza, Poonam Reshma and Das, Ashok Kumar and Bhat, Vivekananda K and Kumar, Neeraj and Rodrigues, Joel J P (2019) RAD-EI:Aroutingattackdetectionschemeforedge-based InternetofThingsenvironment. International Journal of Communication Systems. pp. 1-19. ISSN 1074-5351

[img] PDF
7129.pdf - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
Official URL: http://wileyonlinelibrary.com/journal/da

Abstract

Internet of Things (IoT) offers various types of application services in differentdomains,suchas“smartinfrastructure,health-care,criticalinfrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge-based IoT environment has several security and privacy issues similartothoseforthecloud-basedIoTenvironment.Varioustypesofattacks, such as “replay, man-in-the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge-based IoTenvironment.Theroutingattackernodeshavethecapabilitytodeviateand disrupt the normal flow of traffic. These malicious nodes do not send packets (messages)totheedgenodeandonlysendpacketstoitsneighborcollaborator attackernodes.Therefore,inthepresenceofsuchkindofroutingattack,edge nodedoesnotgettheinformationorsometimesitgetsthepartialinformation. Thisfurtheraffectstheoverallperformanceofcommunicationofedge-basedIoT environment.Inthepresenceofsuchanattack,the“throughputofthenetwork” decreases, “end-to-end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detectionschemeforthedetectionofroutingattackinedge-basedIoTenvironment calledasRAD-EI.WesimulateRAD-EIusingthewidelyused“NS2simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD-EI to prove its resilience against routing attacks. RAD-EI accomplishesaround95.0%“detectionrate”and1.23%“falsepositiverate”that are notably better than other related existing schemes. In addition, RAD-EI is efficientintermsofcomputationandcommunicationcosts.Asaresult,RAD-EI is a good match for some critical and sensitive applications, such as smart securityandsurveillancesystem.

Item Type: Article
Uncontrolled Keywords: edge computing, intrusion detection, IoT, NS2, routing attack, security
Subjects: Engineering > MIT Manipal > Computer Science and Engineering
Depositing User: MIT Library
Date Deposited: 13 Aug 2019 05:21
Last Modified: 13 Aug 2019 05:21
URI: http://eprints.manipal.edu/id/eprint/154358

Actions (login required)

View Item View Item