TY - JOUR
T1 - RSS
T2 - an energy-efficient approach for securing IoT service protocols against the DoS attack
AU - Ghahramani, Meysam
AU - Javidan, Reza
AU - Shojafar, Mohammad
AU - Taheri, Rahim
AU - Alazab, Mamoun
AU - Tafazolli, Rahim
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2021/3/1
Y1 - 2021/3/1
N2 - Authentication protocols are powerful tools to ensure confidentiality as an important feature of Internet of Things (IoT). The Denial-of-Service (DoS) attack is one of the significant threats to availability, as another essential feature of IoT, which deprives users of services by consuming the energy of IoT nodes. On the other hand, computational intelligence algorithms can be applied to solve such issues in the network and cyber domains. Motivated by this, this article links these concepts. To do so, we analyze two lightweight authentication protocols, present a DoS attack inspired by users' misbehavior and suggest a solution called received signal strength, which is easy to compute, applicable for resisting against different kinds of vulnerabilities in Internet protocols, and feasible for practical implementations. We implement it on two scenarios for locating attackers, investigate the effects of IoT devices' internal error on locating, and propose an optimization problem to finding the exact location of attackers, which is efficiently solvable for computational intelligence algorithms, such as TLBO. Besides, we analyze the solutions for unreliable results of accurate devices and provide a solution to detect attackers with less than 12-cm error and the false alarm probability of 0.7%.
AB - Authentication protocols are powerful tools to ensure confidentiality as an important feature of Internet of Things (IoT). The Denial-of-Service (DoS) attack is one of the significant threats to availability, as another essential feature of IoT, which deprives users of services by consuming the energy of IoT nodes. On the other hand, computational intelligence algorithms can be applied to solve such issues in the network and cyber domains. Motivated by this, this article links these concepts. To do so, we analyze two lightweight authentication protocols, present a DoS attack inspired by users' misbehavior and suggest a solution called received signal strength, which is easy to compute, applicable for resisting against different kinds of vulnerabilities in Internet protocols, and feasible for practical implementations. We implement it on two scenarios for locating attackers, investigate the effects of IoT devices' internal error on locating, and propose an optimization problem to finding the exact location of attackers, which is efficiently solvable for computational intelligence algorithms, such as TLBO. Besides, we analyze the solutions for unreliable results of accurate devices and provide a solution to detect attackers with less than 12-cm error and the false alarm probability of 0.7%.
KW - Authentication
KW - Denial-of-Service (DoS) attack
KW - energy conservation
KW - Internet of Things (IoT)
KW - localization
UR - http://www.scopus.com/inward/record.url?scp=85100055154&partnerID=8YFLogxK
U2 - 10.1109/JIOT.2020.3023102
DO - 10.1109/JIOT.2020.3023102
M3 - Article
AN - SCOPUS:85100055154
SN - 2327-4662
VL - 8
SP - 3619
EP - 3635
JO - IEEE Internet of Things Journal
JF - IEEE Internet of Things Journal
IS - 5
M1 - 9194012
ER -