Iain Baird
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
Baird, Iain; Ghaleb, Baraq; Wadhaj, Isam; Russell, Gordon; Buchanan, William J.
Authors
Dr Baraq Ghaleb B.Ghaleb@napier.ac.uk
Associate Professor
Dr Isam Wadhaj I.Wadhaj@napier.ac.uk
Lecturer
Dr Gordon Russell G.Russell@napier.ac.uk
Associate Professor
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Abstract
In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facilitate efficient data routing. However, RPL networks are susceptible to various security threats, with Sybil and flood attacks being particularly detrimental. Sybil attacks involve malicious nodes generating multiple fake identities to disrupt network operations, while flood attacks overwhelm network resources by inundating them with excessive traffic. This paper proposes a novel mitigation strategy leveraging Bloom filters and hash chains to enhance the security of RPL-based IoT networks against sybil and flood attacks. Extensive simulation and performance analysis demonstrate that this solution significantly reduces the impact of sybil and flood attacks while maintaining a low power consumption profile and low computational overhead.
Citation
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13(17), Article 3467. https://doi.org/10.3390/electronics13173467
Journal Article Type | Article |
---|---|
Acceptance Date | Aug 29, 2024 |
Online Publication Date | Aug 31, 2024 |
Publication Date | 2024 |
Deposit Date | Sep 4, 2024 |
Publicly Available Date | Sep 4, 2024 |
Electronic ISSN | 2079-9292 |
Publisher | MDPI |
Peer Reviewed | Peer Reviewed |
Volume | 13 |
Issue | 17 |
Article Number | 3467 |
DOI | https://doi.org/10.3390/electronics13173467 |
Keywords | authentication; Bloom filter; hash chain |
Files
Securing IoT: Mitigating Sybil Flood Attacks With Bloom Filters And Hash Chains
(390 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs)
(2024)
Journal Article
Safeguarding IoT Systems: Novel Authentication Method to Counteract Sybil and Flood Attacks
(2024)
Presentation / Conference Contribution
Cooja Simulator Manual
(2016)
Report
Towards an Energy Balancing Solution for Wireless Sensor Network with Mobile Sink Node
(2021)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search