Novel Technique for Detection of Malicious nodes in IoT
Harsha Gupta1 , Ekta Solanki2 , Anuj Kumar3
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-7 , Page no. 1315-1319, Jul-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i7.13151319
Online published on Jul 31, 2018
Copyright © Harsha Gupta, Ekta Solanki, Anuj Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Harsha Gupta, Ekta Solanki, Anuj Kumar, “Novel Technique for Detection of Malicious nodes in IoT,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1315-1319, 2018.
MLA Style Citation: Harsha Gupta, Ekta Solanki, Anuj Kumar "Novel Technique for Detection of Malicious nodes in IoT." International Journal of Computer Sciences and Engineering 6.7 (2018): 1315-1319.
APA Style Citation: Harsha Gupta, Ekta Solanki, Anuj Kumar, (2018). Novel Technique for Detection of Malicious nodes in IoT. International Journal of Computer Sciences and Engineering, 6(7), 1315-1319.
BibTex Style Citation:
@article{Gupta_2018,
author = {Harsha Gupta, Ekta Solanki, Anuj Kumar},
title = {Novel Technique for Detection of Malicious nodes in IoT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1315-1319},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2605},
doi = {https://doi.org/10.26438/ijcse/v6i7.13151319}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.13151319}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2605
TI - Novel Technique for Detection of Malicious nodes in IoT
T2 - International Journal of Computer Sciences and Engineering
AU - Harsha Gupta, Ekta Solanki, Anuj Kumar
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1315-1319
IS - 7
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
491 | 374 downloads | 242 downloads |
Abstract
IoT is the technology in which the sensed information is aggregated to the base station, which is uploaded to the internet. Due to the decentralized nature of the network security, energy consumption is the major issue of the network. In the base paper technique, security to the network is provided in which uni-directional and bi-directional communication is possible. This research work is based on the misdirection attack on the network. The whole network is divided into fixed size clusters and cluster heads are selected in each cluster using LEACH protocol based on energy and distance. The technique of threshold-based is proposed in this work for the detection of malicious nodes from the network. The work is implemented using NS2.
Key-Words / Index Term
IoT, Ns2, Malicious Nodes, LEACH
References
[1] Z. Zhong, J. Peng, K. Huang, and Z. Zhong, “Analysis on Physical-Layer Security for Internet of Things in Ultra-Dense Heterogeneous Networks”, in Proc. of IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 39-43, 2016.
[2] T. Charity, H. Hua, “Smart World of Internet of Things (IoT) and It`s Security Concerns”, in Proc. of IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 240-245, 2016.
[3] Mukhopadhyay, “PUFs as Promising Tools for Security in the Internet of Things”, IEEE Journal of Design and Test, vol. 33, no. 3, pp. 103-115, 2016.
[4] B. Sundaram, M. Ramnath, M. Prasanth, M. Sundaram, “Encryption and Hash-based Security in the Internet of Things”, in Proc. of IEEE International Conference on Signal Processing, Communication and Networking (ICSCN), vol. 3, pp. 1-5, 2015.
[5] V. Petrov, S. Edelev, M. Komar, and Y. Koucheryavy, “Towards the era of wireless keys: How the IoT can change authentication paradigm,” in IEEE World Forum on the Internet of Things (WF-IoT). Mar. 2014.
[6] A. Ranjan and G. Somani, “Access control and authentication in the internet of things environment,” in Computer Communications and Networks, pp. 283–305, 2016
[7] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications,” IEEE Communications Surveys Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
[8] P. Wortman, F. Tehranipoor, N. Karimian, and J. Chandy, “Proposing a Modeling Framework for Minimizing Security Vulnerabilities in IoT Systems in the Healthcare Domain”, in Proc. of IEEEEMBS International Conference on Biomedical & Health Informatics (BHI), pp. 185-188, 2017.
[9] Z. Guo, N. Karimian, M. Tehranipoor and D. Forte, “Hardware Security Meets Biometrics for the Age of IoT”, in Proc. of IEEE International Symposium on Circuits & Systems (ISCAS), pp. 1318-1321, 2016.
[10] T. Abels, R. Khanna, K. Midkiff, “Future Proof IoT: Composable Semantics, Security, QoS and Reliability”, in Proc. of IEEE Topical Conference on Wireless Sensor & Sensor Networks (WiSNet), pp. 1-4, 2017.
[11] M. Mohsin and Z. Anwar, “Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics”, in Proc. of International Conference on Frontiers of Information Technology (FIT), pp.23-28, 2016.
[12] R. Kodali, V. Jain, S. Bose and L. Boppana, “IoT Based Smart Security and Home Automation System”, in Proc. of IEEE International Conference on Computing, Communication and Automation (ICCCA), pp. 1286-1289, 2016.