RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment

Mohammad Wazid, Poonam Reshma Dsouza, Ashok Kumar Das, Vivekananda Bhat K, Neeraj Kumar, Joel J.P.C. Rodrigues

Research output: Contribution to journalArticle

Abstract

Internet of Things (IoT) offers various types of application services in different domains, such as “smart infrastructure, health-care, critical infrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge-based IoT environment has several security and privacy issues similar to those for the cloud-based IoT environment. Various types of attacks, such as “replay, man-in-the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge-based IoT environment. The routing attacker nodes have the capability to deviate and disrupt the normal flow of traffic. These malicious nodes do not send packets (messages) to the edge node and only send packets to its neighbor collaborator attacker nodes. Therefore, in the presence of such kind of routing attack, edge node does not get the information or sometimes it gets the partial information. This further affects the overall performance of communication of edge-based IoT environment. In the presence of such an attack, the “throughput of the network” decreases, “end-to-end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detection scheme for the detection of routing attack in edge-based IoT environment called as RAD-EI. We simulate RAD-EI using the widely used “NS2 simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD-EI to prove its resilience against routing attacks. RAD-EI accomplishes around 95.0% “detection rate” and 1.23% “false positive rate” that are notably better than other related existing schemes. In addition, RAD-EI is efficient in terms of computation and communication costs. As a result, RAD-EI is a good match for some critical and sensitive applications, such as smart security and surveillance system.

Original languageEnglish
Article numbere4024
JournalInternational Journal of Communication Systems
Volume32
Issue number15
DOIs
Publication statusPublished - 01-10-2019

Fingerprint

Critical infrastructures
Smart sensors
Communication
Intrusion detection
Internet of things
Health care
Simulators
Throughput
Costs
Denial-of-service attack

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Wazid, Mohammad ; Reshma Dsouza, Poonam ; Das, Ashok Kumar ; Bhat K, Vivekananda ; Kumar, Neeraj ; Rodrigues, Joel J.P.C. / RAD-EI : A routing attack detection scheme for edge-based Internet of Things environment. In: International Journal of Communication Systems. 2019 ; Vol. 32, No. 15.
@article{d97d5cc3280f4e12809a78ea5fc75545,
title = "RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment",
abstract = "Internet of Things (IoT) offers various types of application services in different domains, such as “smart infrastructure, health-care, critical infrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge-based IoT environment has several security and privacy issues similar to those for the cloud-based IoT environment. Various types of attacks, such as “replay, man-in-the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge-based IoT environment. The routing attacker nodes have the capability to deviate and disrupt the normal flow of traffic. These malicious nodes do not send packets (messages) to the edge node and only send packets to its neighbor collaborator attacker nodes. Therefore, in the presence of such kind of routing attack, edge node does not get the information or sometimes it gets the partial information. This further affects the overall performance of communication of edge-based IoT environment. In the presence of such an attack, the “throughput of the network” decreases, “end-to-end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detection scheme for the detection of routing attack in edge-based IoT environment called as RAD-EI. We simulate RAD-EI using the widely used “NS2 simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD-EI to prove its resilience against routing attacks. RAD-EI accomplishes around 95.0{\%} “detection rate” and 1.23{\%} “false positive rate” that are notably better than other related existing schemes. In addition, RAD-EI is efficient in terms of computation and communication costs. As a result, RAD-EI is a good match for some critical and sensitive applications, such as smart security and surveillance system.",
author = "Mohammad Wazid and {Reshma Dsouza}, Poonam and Das, {Ashok Kumar} and {Bhat K}, Vivekananda and Neeraj Kumar and Rodrigues, {Joel J.P.C.}",
year = "2019",
month = "10",
day = "1",
doi = "10.1002/dac.4024",
language = "English",
volume = "32",
journal = "International Journal of Communication Systems",
issn = "1074-5351",
publisher = "John Wiley and Sons Ltd",
number = "15",

}

RAD-EI : A routing attack detection scheme for edge-based Internet of Things environment. / Wazid, Mohammad; Reshma Dsouza, Poonam; Das, Ashok Kumar; Bhat K, Vivekananda; Kumar, Neeraj; Rodrigues, Joel J.P.C.

In: International Journal of Communication Systems, Vol. 32, No. 15, e4024, 01.10.2019.

Research output: Contribution to journalArticle

TY - JOUR

T1 - RAD-EI

T2 - A routing attack detection scheme for edge-based Internet of Things environment

AU - Wazid, Mohammad

AU - Reshma Dsouza, Poonam

AU - Das, Ashok Kumar

AU - Bhat K, Vivekananda

AU - Kumar, Neeraj

AU - Rodrigues, Joel J.P.C.

PY - 2019/10/1

Y1 - 2019/10/1

N2 - Internet of Things (IoT) offers various types of application services in different domains, such as “smart infrastructure, health-care, critical infrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge-based IoT environment has several security and privacy issues similar to those for the cloud-based IoT environment. Various types of attacks, such as “replay, man-in-the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge-based IoT environment. The routing attacker nodes have the capability to deviate and disrupt the normal flow of traffic. These malicious nodes do not send packets (messages) to the edge node and only send packets to its neighbor collaborator attacker nodes. Therefore, in the presence of such kind of routing attack, edge node does not get the information or sometimes it gets the partial information. This further affects the overall performance of communication of edge-based IoT environment. In the presence of such an attack, the “throughput of the network” decreases, “end-to-end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detection scheme for the detection of routing attack in edge-based IoT environment called as RAD-EI. We simulate RAD-EI using the widely used “NS2 simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD-EI to prove its resilience against routing attacks. RAD-EI accomplishes around 95.0% “detection rate” and 1.23% “false positive rate” that are notably better than other related existing schemes. In addition, RAD-EI is efficient in terms of computation and communication costs. As a result, RAD-EI is a good match for some critical and sensitive applications, such as smart security and surveillance system.

AB - Internet of Things (IoT) offers various types of application services in different domains, such as “smart infrastructure, health-care, critical infrastructure, and intelligent transportation system.” The name edge computing signifies a corner or edge in a network at which traffic enters or exits from the network. In edge computing, the data analysis task happens very close to the IoT smart sensors and devices. Edge computing can also speed up the analysis process, which allows decision makers to take action within a short duration of time. However, edge-based IoT environment has several security and privacy issues similar to those for the cloud-based IoT environment. Various types of attacks, such as “replay, man-in-the middle, impersonation, password guessing, routing attack, and other denial of service attacks” may be possible in edge-based IoT environment. The routing attacker nodes have the capability to deviate and disrupt the normal flow of traffic. These malicious nodes do not send packets (messages) to the edge node and only send packets to its neighbor collaborator attacker nodes. Therefore, in the presence of such kind of routing attack, edge node does not get the information or sometimes it gets the partial information. This further affects the overall performance of communication of edge-based IoT environment. In the presence of such an attack, the “throughput of the network” decreases, “end-to-end delay” increases, “packet delivery ratio” decreases, and other parameters also get affected. Consequently, it is important to provide solution for such kind of attack. In this paper, we design an intrusion detection scheme for the detection of routing attack in edge-based IoT environment called as RAD-EI. We simulate RAD-EI using the widely used “NS2 simulator” to measure different network parameters. Furthermore, we provide the security analysis of RAD-EI to prove its resilience against routing attacks. RAD-EI accomplishes around 95.0% “detection rate” and 1.23% “false positive rate” that are notably better than other related existing schemes. In addition, RAD-EI is efficient in terms of computation and communication costs. As a result, RAD-EI is a good match for some critical and sensitive applications, such as smart security and surveillance system.

UR - http://www.scopus.com/inward/record.url?scp=85070692539&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85070692539&partnerID=8YFLogxK

U2 - 10.1002/dac.4024

DO - 10.1002/dac.4024

M3 - Article

AN - SCOPUS:85070692539

VL - 32

JO - International Journal of Communication Systems

JF - International Journal of Communication Systems

SN - 1074-5351

IS - 15

M1 - e4024

ER -