Open Access   Article Go Back

Identification and Removal of Jelly-Fish Attack in IoT

Manveen Kaur1 , Jashanpreet Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 407-414, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.407414

Online published on Jun 30, 2018

Copyright © Manveen Kaur, Jashanpreet Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manveen Kaur, Jashanpreet Kaur, “Identification and Removal of Jelly-Fish Attack in IoT,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.407-414, 2018.

MLA Style Citation: Manveen Kaur, Jashanpreet Kaur "Identification and Removal of Jelly-Fish Attack in IoT." International Journal of Computer Sciences and Engineering 6.6 (2018): 407-414.

APA Style Citation: Manveen Kaur, Jashanpreet Kaur, (2018). Identification and Removal of Jelly-Fish Attack in IoT. International Journal of Computer Sciences and Engineering, 6(6), 407-414.

BibTex Style Citation:
@article{Kaur_2018,
author = {Manveen Kaur, Jashanpreet Kaur},
title = {Identification and Removal of Jelly-Fish Attack in IoT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {407-414},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2196},
doi = {https://doi.org/10.26438/ijcse/v6i6.407414}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.407414}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2196
TI - Identification and Removal of Jelly-Fish Attack in IoT
T2 - International Journal of Computer Sciences and Engineering
AU - Manveen Kaur, Jashanpreet Kaur
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 407-414
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
527 427 downloads 160 downloads
  
  
           

Abstract

IoT is the internet of things where various small utility based networks interconnect to each other. Thus, they can share the data amongst enormous connected devices and small IoT based network for utility share the data to the remote network. This way the network can have the vulnerability to various types of attacks. While there is an attack situation the network performance will be downgraded. The trust-based scheme has been used for detection of the Sybil and the Jellyfish attacker node. This technique will be based on self-cooperation between the nodes. Where each node mark the trust value of the other node. Only trusted nodes will be marked as the intermediate node. In consequently, no malicious node can be the part of the network. The performance can be enhanced using the trust based value technique. This performance has been measured under two different parameters like the end to end delay and the throughput.

Key-Words / Index Term

Ad-hoc ,Sybil, Internet of Things. Jellyfish, ESCT, Trust Value , Security Challenges, Delay variance, end to end encryption,Throughput

References

[1] Hamdan , Husam Tibor , László “Survey of Platforms for Massive IoT”, 2018 IEEE, 978-1-5386-1208-8
[2] Vipindev Adat, and B. B. Gupta,” A DDoS Attack Mitigation Framework for Internet of Things”,issue 978,2017.
[3] Sujatha Sivabalan, Dr P J Radcliffe et al. “Detecting IoT Zombie Attacks on Web Servers”,2017 ,27th Int. Telecommunication Networks and Applications Conference (ITNAC) pp 1-3.
[4] H. Suo, J. Wan, C. Zou, and J. Liu, “Security in the Internet of Things: A Review,” 2012, in Proc. of Intl. Conf. on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648-651
[5] J. Granjal, E. Monteiro, and J. S´a Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues,” 2015, IEEE Communications Surveys & Tutorials Volume: 17, Issue: 3, pp. 1294-1312.
[6] M. Todd Gardner, Cory Beard, Deep Medhi ”Using SEIRS Epidemic Models for IoT Botnets Attacks” 2017 ISBN 978-3-8007-4383-4 pp 1-8 IEEE DRCN CONFERENCE 2017.

[8] Sapna Hans and Jitendra Kumar,” A Review on Jellyfish Attack in MANET”, 2015 Int. Journel of Engineering, Applied and Management Sciences Paradigms, Vol 24, Issue 01.
[9] J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements and future direction”, 2013, Future Generation Computer Systems, Vol.29, p. 1645-1660
[10] S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Computer Networks, Volume 76, 15 January 2015, Pages 146-164
[11] R. H. Weber, “Internet of Things – New security and privacy challenges,” Computer Law & Security Review, Vol. 26, No. 1, Jan. 2010, pp. 23-30
[12] J. Yun, Il-Y. Ahn, N.-M. Sung, and J. Kim, “A Device Software Platform for Consumer Electronics Based on the Internet of Things”, 2015, IEEE Transactions on Consumer Electronics, Vol. 61, No. 4
[13] Surapon Kraijak1 “A Survey On IoT Architectures, Protocols, Applications, Security, Privacy, Real-World Implementation And Future Trends” 2016 IEEE 978-1-78561-035-6 pp 1-6
[14] Mian.M Ahemd,” IoT Security: A Layered Approach for Attacks & Defenses” ,2017 IEEE - 978-1-5090-5984-3 pp-104-110
[15] A.Rajan“ Sybil Attack in IoT : Modeling and Defenses ”, 2017 IEEE- 978-1-5090-6367-3/17 pp 2323-2327
[16] Ruo Jun Cai,Xue Jun Li,and Peter Han Joo Chong “An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs “ 2017, IEEE - 1536-1233 pp.1-1
[17] Patel Pooja Munish Megha ,”Jelly Fish Attack Detection and Prevention in MANET”, 2017, IEEE- 978-1-5090-4929-5
[18] Sakshi Sachdeva ,“Detection and analysis of Jellyfish attack in MANETs”, 2017, IEEE pp1-5