RSS: an energy-efficient approach for securing IoT service protocols against the DoS attack

Meysam Ghahramani, Reza Javidan, Mohammad Shojafar, Rahim Taheri, Mamoun Alazab*, Rahim Tafazolli

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Authentication protocols are powerful tools to ensure confidentiality as an important feature of Internet of Things (IoT). The Denial-of-Service (DoS) attack is one of the significant threats to availability, as another essential feature of IoT, which deprives users of services by consuming the energy of IoT nodes. On the other hand, computational intelligence algorithms can be applied to solve such issues in the network and cyber domains. Motivated by this, this article links these concepts. To do so, we analyze two lightweight authentication protocols, present a DoS attack inspired by users' misbehavior and suggest a solution called received signal strength, which is easy to compute, applicable for resisting against different kinds of vulnerabilities in Internet protocols, and feasible for practical implementations. We implement it on two scenarios for locating attackers, investigate the effects of IoT devices' internal error on locating, and propose an optimization problem to finding the exact location of attackers, which is efficiently solvable for computational intelligence algorithms, such as TLBO. Besides, we analyze the solutions for unreliable results of accurate devices and provide a solution to detect attackers with less than 12-cm error and the false alarm probability of 0.7%.

Original languageEnglish
Article number9194012
Pages (from-to)3619-3635
Number of pages17
JournalIEEE Internet of Things Journal
Volume8
Issue number5
Early online date10 Sep 2020
DOIs
Publication statusPublished - 1 Mar 2021

Keywords

  • Authentication
  • Denial-of-Service (DoS) attack
  • energy conservation
  • Internet of Things (IoT)
  • localization

Fingerprint

Dive into the research topics of 'RSS: an energy-efficient approach for securing IoT service protocols against the DoS attack'. Together they form a unique fingerprint.

Cite this