Open Access   Article Go Back

Novel Technique for Detection of Malicious nodes in IoT

Harsha Gupta1 , Ekta Solanki2 , Anuj Kumar3

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1315-1319, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.13151319

Online published on Jul 31, 2018

Copyright © Harsha Gupta, Ekta Solanki, Anuj Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Harsha Gupta, Ekta Solanki, Anuj Kumar, “Novel Technique for Detection of Malicious nodes in IoT,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1315-1319, 2018.

MLA Style Citation: Harsha Gupta, Ekta Solanki, Anuj Kumar "Novel Technique for Detection of Malicious nodes in IoT." International Journal of Computer Sciences and Engineering 6.7 (2018): 1315-1319.

APA Style Citation: Harsha Gupta, Ekta Solanki, Anuj Kumar, (2018). Novel Technique for Detection of Malicious nodes in IoT. International Journal of Computer Sciences and Engineering, 6(7), 1315-1319.

BibTex Style Citation:
@article{Gupta_2018,
author = {Harsha Gupta, Ekta Solanki, Anuj Kumar},
title = {Novel Technique for Detection of Malicious nodes in IoT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1315-1319},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2605},
doi = {https://doi.org/10.26438/ijcse/v6i7.13151319}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.13151319}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2605
TI - Novel Technique for Detection of Malicious nodes in IoT
T2 - International Journal of Computer Sciences and Engineering
AU - Harsha Gupta, Ekta Solanki, Anuj Kumar
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1315-1319
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
491 374 downloads 242 downloads
  
  
           

Abstract

IoT is the technology in which the sensed information is aggregated to the base station, which is uploaded to the internet. Due to the decentralized nature of the network security, energy consumption is the major issue of the network. In the base paper technique, security to the network is provided in which uni-directional and bi-directional communication is possible. This research work is based on the misdirection attack on the network. The whole network is divided into fixed size clusters and cluster heads are selected in each cluster using LEACH protocol based on energy and distance. The technique of threshold-based is proposed in this work for the detection of malicious nodes from the network. The work is implemented using NS2.

Key-Words / Index Term

IoT, Ns2, Malicious Nodes, LEACH

References

[1] Z. Zhong, J. Peng, K. Huang, and Z. Zhong, “Analysis on Physical-Layer Security for Internet of Things in Ultra-Dense Heterogeneous Networks”, in Proc. of IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 39-43, 2016.
[2] T. Charity, H. Hua, “Smart World of Internet of Things (IoT) and It`s Security Concerns”, in Proc. of IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 240-245, 2016.
[3] Mukhopadhyay, “PUFs as Promising Tools for Security in the Internet of Things”, IEEE Journal of Design and Test, vol. 33, no. 3, pp. 103-115, 2016.
[4] B. Sundaram, M. Ramnath, M. Prasanth, M. Sundaram, “Encryption and Hash-based Security in the Internet of Things”, in Proc. of IEEE International Conference on Signal Processing, Communication and Networking (ICSCN), vol. 3, pp. 1-5, 2015.
[5] V. Petrov, S. Edelev, M. Komar, and Y. Koucheryavy, “Towards the era of wireless keys: How the IoT can change authentication paradigm,” in IEEE World Forum on the Internet of Things (WF-IoT). Mar. 2014.
[6] A. Ranjan and G. Somani, “Access control and authentication in the internet of things environment,” in Computer Communications and Networks, pp. 283–305, 2016
[7] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
[8] P. Wortman, F. Tehranipoor, N. Karimian, and J. Chandy, “Proposing a Modeling Framework for Minimizing Security Vulnerabilities in IoT Systems in the Healthcare Domain”, in Proc. of IEEEEMBS International Conference on Biomedical & Health Informatics (BHI), pp. 185-188, 2017.
[9] Z. Guo, N. Karimian, M. Tehranipoor and D. Forte, “Hardware Security Meets Biometrics for the Age of IoT”, in Proc. of IEEE International Symposium on Circuits & Systems (ISCAS), pp. 1318-1321, 2016.
[10] T. Abels, R. Khanna, K. Midkiff, “Future Proof IoT: Composable Semantics, Security, QoS and Reliability”, in Proc. of IEEE Topical Conference on Wireless Sensor & Sensor Networks (WiSNet), pp. 1-4, 2017.
[11] M. Mohsin and Z. Anwar, “Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics”, in Proc. of International Conference on Frontiers of Information Technology (FIT), pp.23-28, 2016.
[12] R. Kodali, V. Jain, S. Bose and L. Boppana, “IoT Based Smart Security and Home Automation System”, in Proc. of IEEE International Conference on Computing, Communication and Automation (ICCCA), pp. 1286-1289, 2016.