Skip to main content

2024 | OriginalPaper | Buchkapitel

Investigation of Sinkhole Attacks and Network Simulation on 6LoWPAN

verfasst von : Shreya Singh, Megha Gupta, Deepak Kumar Sharma

Erschienen in: Cryptology and Network Security with Machine Learning

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sinkhole attacks have been the most dangerous threat to security in recent times. The attackers send malicious requests to Domain Name Server (DNS) that causes unavailability of services and redirects the victim to the destination designed by the malicious attacker. The malicious attacker with the help of these compromised devices forms a BOTNET and uses it for malicious purposes like ransomware, extortion, unauthorized access, fraudulent attempts, data theft, financial gains, eavesdropping, repudiation, etc. The attacker node or the sinkhole node was placed at three different locations to observe the change in count of DIO messages. The purpose of this research was to detect that at what locations can attacker gather a large amount of data. It was observed that when the attacker node was placed at the edge and along the communication links, there was a significant increase in the count of DIO messages. This means that at these points, attacker can gather a lot of information.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Bello AD, Lamba OS (2020) How to detect and mitigate Sinkhole attack in wireless sensor network (WSN). Int J Eng Res Technol 09(05) Bello AD, Lamba OS (2020) How to detect and mitigate Sinkhole attack in wireless sensor network (WSN). Int J Eng Res Technol 09(05)
7.
Zurück zum Zitat Vincent A, Francis F, Ayyappadas PS Security aspects in 6lowpan networks: a study. IOSR J Electr Commun Eng 08–12 (2278-8735) Vincent A, Francis F, Ayyappadas PS Security aspects in 6lowpan networks: a study. IOSR J Electr Commun Eng 08–12 (2278-8735)
8.
Zurück zum Zitat Selvakumar M (2017) An effective mitigation of various attacks in 6lowpan wireless sensor networks. IJIRMPS 5(4):2349–7300 Selvakumar M (2017) An effective mitigation of various attacks in 6lowpan wireless sensor networks. IJIRMPS 5(4):2349–7300
12.
Zurück zum Zitat Sajjad SM, Yousaf M (2016) Security analysis of internet of things adaptation layer. Sci Int 28(4):3311–3317 Sajjad SM, Yousaf M (2016) Security analysis of internet of things adaptation layer. Sci Int 28(4):3311–3317
13.
Zurück zum Zitat Dunkels A, Eriksson J, Finne N, Tsiftes N (2011) Powertrace: network-level power profiling for low-power wireless networks. SICS Technical Report T2011:05 (ISSN 1100-3154) Dunkels A, Eriksson J, Finne N, Tsiftes N (2011) Powertrace: network-level power profiling for low-power wireless networks. SICS Technical Report T2011:05 (ISSN 1100-3154)
14.
Zurück zum Zitat Kasinathan P et al (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: ACM SIGSAC conference on computer and communications security (CCS’13) Kasinathan P et al (2013) Denial-of-service detection in 6LoWPAN based internet of things. In: ACM SIGSAC conference on computer and communications security (CCS’13)
20.
Zurück zum Zitat Betreuer TT, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network Architecture and Services (Seminar SN SS2011) Betreuer TT, Klein A (2011) RPL: IPv6 routing protocol for low power and lossy networks. Network Architecture and Services (Seminar SN SS2011)
22.
Zurück zum Zitat Chakraborty S, Majumder A (2019) 6LoWPAN security: classification, analysis and open research issues. Proc Int Conf Comput Intell IoT 1(1) Chakraborty S, Majumder A (2019) 6LoWPAN security: classification, analysis and open research issues. Proc Int Conf Comput Intell IoT 1(1)
23.
Zurück zum Zitat Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE international symposium on integrated network management (IM) Cervantes C, Poplade D, Nogueira M, Santos A (2015) Detection of sinkhole attacks for supporting secure routing on 6LoWPAN for Internet of Things. In: 2015 IFIP/IEEE international symposium on integrated network management (IM)
24.
Zurück zum Zitat Stephen R, Arockiam L (2017) An enhanced technique to detect sinkhole attack in the internet of things. Int J Eng Res Technol 5(13) Stephen R, Arockiam L (2017) An enhanced technique to detect sinkhole attack in the internet of things. Int J Eng Res Technol 5(13)
28.
Zurück zum Zitat Sherasiya T, Upadhay H, Patel HB (2016) A survey: intrusion detection system for internet of things. Int J Comput Sci Eng 5(2):91–98 Sherasiya T, Upadhay H, Patel HB (2016) A survey: intrusion detection system for internet of things. Int J Comput Sci Eng 5(2):91–98
30.
Zurück zum Zitat Kim K, Park SD, Montenegro G, Yoo S, Kushalnagar N (2007) 6LoWPAN ad hoc on-demand distance vector routing (LOAD). Network working group internet-draft (work in progress), vol 19 Kim K, Park SD, Montenegro G, Yoo S, Kushalnagar N (2007) 6LoWPAN ad hoc on-demand distance vector routing (LOAD). Network working group internet-draft (work in progress), vol 19
31.
Zurück zum Zitat Thakur N, Shahare P (2017) Sinkhole attack in wireless sensor. Int J Technol Res Eng 4(10) Thakur N, Shahare P (2017) Sinkhole attack in wireless sensor. Int J Technol Res Eng 4(10)
32.
34.
Zurück zum Zitat Kenji I, Matsunaga T, Toyoda K, Sasase I (2015) Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. IEICE Commun Exp 4(11):340–345CrossRef Kenji I, Matsunaga T, Toyoda K, Sasase I (2015) Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. IEICE Commun Exp 4(11):340–345CrossRef
37.
Zurück zum Zitat Mayzaud A, Badonnel R, Chrisment I (2016) Taxonomy of Attacks in RPL-based Internet of Things. Int J Netw Sec 18(3):459–473 Mayzaud A, Badonnel R, Chrisment I (2016) Taxonomy of Attacks in RPL-based Internet of Things. Int J Netw Sec 18(3):459–473
39.
Zurück zum Zitat Pomal J, Upadhay D (2020) A survey on various detection techniques of sinkhole attacks in WSN. Int Res J Eng Technol 7(11) Pomal J, Upadhay D (2020) A survey on various detection techniques of sinkhole attacks in WSN. Int Res J Eng Technol 7(11)
41.
Zurück zum Zitat Shukla V, Chaturvedi A (2018) Cryptocurrency: characteristics and future perspectives 53(2):77–80. 164.100.161.164/pdf/e-book/june-july-18.pdf#page=14 Shukla V, Chaturvedi A (2018) Cryptocurrency: characteristics and future perspectives 53(2):77–80. 164.100.161.164/pdf/e-book/june-july-18.pdf#page=14
42.
Zurück zum Zitat Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883CrossRef Narwal B, Mohapatra AK (2021) A survey on security and authentication in wireless body area networks. J Syst Architect 113:101883CrossRef
43.
Zurück zum Zitat Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, volume 661)), pp 713–720. https://doi.org/10.1007/978-981-15-4692-1_54 Shukla V, Mishra A, Agarwal S (2020) A new one time password generation method for financial transactions with randomness analysis. In: Innovations in electrical and electronic engineering (part of the lecture notes in electrical engineering book series (LNEE, volume 661)), pp 713–720. https://​doi.​org/​10.​1007/​978-981-15-4692-1_​54
46.
Zurück zum Zitat Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008 Narwal B, Mohapatra AK (2020) SEEMAKA: secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wirel Pers Commun 113(4):1985–2008
47.
Zurück zum Zitat Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662CrossRef Sharma M, Narwal B, Anand R, Mohapatra AK, Yadav R (2023) PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones. Comput Electr Eng 108:108662CrossRef
48.
Zurück zum Zitat Kayalvizhi M, Arul Kumaran G, Nithysari A (2014) Detection and prevention of sinkhole attack on zone routing protocol (ZRP) in MANET. Int J Modern Trends Eng Res Kayalvizhi M, Arul Kumaran G, Nithysari A (2014) Detection and prevention of sinkhole attack on zone routing protocol (ZRP) in MANET. Int J Modern Trends Eng Res
50.
Zurück zum Zitat Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219CrossRef Narwal B, Mohapatra AK (2021) SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks. Arab J Sci Eng 46(9):9197–9219CrossRef
52.
Zurück zum Zitat Yasin NM, Balaji N, Sambasivam G, Basha MSS, Sujatha P (2017) ADSMS: anomaly detection scheme for mitigating sink hole attack in wireless sensor network. In: International conference on technical advancements in computers and communications, (ICTACC) Yasin NM, Balaji N, Sambasivam G, Basha MSS, Sujatha P (2017) ADSMS: anomaly detection scheme for mitigating sink hole attack in wireless sensor network. In: International conference on technical advancements in computers and communications, (ICTACC)
53.
Zurück zum Zitat Ngai ECH, Liu J, Lyu MR (2007) An efficient intruder detection algorithm against Sinkhole attacks in wireless sensor networks. Comput Commun 30(11–12):2353–2364 Ngai ECH, Liu J, Lyu MR (2007) An efficient intruder detection algorithm against Sinkhole attacks in wireless sensor networks. Comput Commun 30(11–12):2353–2364
54.
Zurück zum Zitat Hachemi F-E, Mana M, Bensaber BA (2020) Study of the impact of sinkhole attack in IoT using shewhart control charts. In: GLOBECOM 2020—2020 IEEE global communications conference, Taipei, Taiwan, pp 1–5 Hachemi F-E, Mana M, Bensaber BA (2020) Study of the impact of sinkhole attack in IoT using shewhart control charts. In: GLOBECOM 2020—2020 IEEE global communications conference, Taipei, Taiwan, pp 1–5
55.
Zurück zum Zitat Yadav H, Tak S (2018) Detection of sinkhole attack in wireless sensor network using ad-hoc on-demand distance vector. Int J Eng Res Technol 7(5) Yadav H, Tak S (2018) Detection of sinkhole attack in wireless sensor network using ad-hoc on-demand distance vector. Int J Eng Res Technol 7(5)
56.
Zurück zum Zitat Kibirige GW, Sanga C A survey on detection of sinkhole attacks in wireless sensor network. Int J Comput Sci Inf 13:20 Kibirige GW, Sanga C A survey on detection of sinkhole attacks in wireless sensor network. Int J Comput Sci Inf 13:20
57.
Zurück zum Zitat Kaur P, Kaur N (2017) A hybrid approach to resolve Sinkhole attack in WSN using RAEED and ADOV protocols. Int J Adv Eng Res Dev 4:77 Kaur P, Kaur N (2017) A hybrid approach to resolve Sinkhole attack in WSN using RAEED and ADOV protocols. Int J Adv Eng Res Dev 4:77
Metadaten
Titel
Investigation of Sinkhole Attacks and Network Simulation on 6LoWPAN
verfasst von
Shreya Singh
Megha Gupta
Deepak Kumar Sharma
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0641-9_6

Neuer Inhalt