Skip to main content

Research Repository

Advanced Search

Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks

Baird, Iain; Ghaleb, Baraq; Wadhaj, Isam; Russell, Gordon; Buchanan, William J.

Authors

Iain Baird



Abstract

This paper introduces an innovative strategy for countering Sybil and DODAG Information Solicitation (DIS) flood attacks within lightweight Internet of Things (IoT) networks. The proposed method combines a one-way hash chain with a Bloom filter, leveraging the probabilistic and space-efficient attributes of Bloom filters for swift query responses and efficient identity verification across extensive data sets. Sybil attacks, characterized by the creation of multiple counterfeit identities to gain control over a network, and flood attacks, which overwhelm a network with excessive traffic, are significant threats addressed by this approach. Particularly in Routing Protocol for Low Power and Lossy Networks (RPL), Sybil attacks pose a challenge to threshold-based protection against flood attacks by frequently altering node identities. To mitigate these risks, the suggested solution advocates for each node in the network to generate a one-way series of hashes. The root of this hash chain is then employed for identifying and filtering legitimate traffic using the Bloom filter. This method aims to enhance security in lightweight IoT networks by thwarting Sybil and flood attacks through a combination of one-way hash chains and Bloom filters.

Citation

Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024, June). Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks. Presented at 4th International Conference on Robotics and Control Engineering, Edinburgh

Presentation Conference Type Conference Paper (published)
Conference Name 4th International Conference on Robotics and Control Engineering
Start Date Jun 27, 2024
End Date Jun 29, 2024
Online Publication Date Aug 21, 2024
Publication Date Aug 21, 2024
Deposit Date Sep 2, 2024
Publicly Available Date Sep 2, 2024
Publisher Association for Computing Machinery (ACM)
Peer Reviewed Peer Reviewed
Pages 165-170
Book Title RobCE '24: Proceedings of the 2024 4th International Conference on Robotics and Control Engineering
ISBN 979-8-4007-1678-2
DOI https://doi.org/10.1145/3674746.3674772
Keywords Hash-chain, Bloom filter, Authentication

Files





You might also like



Downloadable Citations