Iain Baird
Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks
Baird, Iain; Ghaleb, Baraq; Wadhaj, Isam; Russell, Gordon; Buchanan, William J.
Authors
Dr Baraq Ghaleb B.Ghaleb@napier.ac.uk
Associate Professor
Dr Isam Wadhaj I.Wadhaj@napier.ac.uk
Lecturer
Dr Gordon Russell G.Russell@napier.ac.uk
Associate Professor
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Abstract
This paper introduces an innovative strategy for countering Sybil and DODAG Information Solicitation (DIS) flood attacks within lightweight Internet of Things (IoT) networks. The proposed method combines a one-way hash chain with a Bloom filter, leveraging the probabilistic and space-efficient attributes of Bloom filters for swift query responses and efficient identity verification across extensive data sets. Sybil attacks, characterized by the creation of multiple counterfeit identities to gain control over a network, and flood attacks, which overwhelm a network with excessive traffic, are significant threats addressed by this approach. Particularly in Routing Protocol for Low Power and Lossy Networks (RPL), Sybil attacks pose a challenge to threshold-based protection against flood attacks by frequently altering node identities. To mitigate these risks, the suggested solution advocates for each node in the network to generate a one-way series of hashes. The root of this hash chain is then employed for identifying and filtering legitimate traffic using the Bloom filter. This method aims to enhance security in lightweight IoT networks by thwarting Sybil and flood attacks through a combination of one-way hash chains and Bloom filters.
Citation
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024, June). Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. Presented at 4th International Conference on Robotics and Control Engineering, Edinburgh
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 4th International Conference on Robotics and Control Engineering |
Start Date | Jun 27, 2024 |
End Date | Jun 29, 2024 |
Online Publication Date | Aug 21, 2024 |
Publication Date | Aug 21, 2024 |
Deposit Date | Sep 2, 2024 |
Publicly Available Date | Sep 2, 2024 |
Publisher | Association for Computing Machinery (ACM) |
Peer Reviewed | Peer Reviewed |
Pages | 165-170 |
Book Title | RobCE '24: Proceedings of the 2024 4th International Conference on Robotics and Control Engineering |
ISBN | 979-8-4007-1678-2 |
DOI | https://doi.org/10.1145/3674746.3674772 |
Keywords | Hash-chain, Bloom filter, Authentication |
Files
Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks
(530 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs)
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search