Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment

The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes (<inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi...

Full description

Bibliographic Details
Main Authors: Sumit Pundir, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, Youngho Park
Format: Article
Language:English
Published: MDPI AG 2020-02-01
Series:Sensors
Subjects:
Online Access:https://www.mdpi.com/1424-8220/20/5/1300
id doaj-353658ac8fb24fc79e127aaff05d3c22
record_format Article
spelling doaj-353658ac8fb24fc79e127aaff05d3c222020-11-25T01:55:18ZengMDPI AGSensors1424-82202020-02-01205130010.3390/s20051300s20051300Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT DeploymentSumit Pundir0Mohammad Wazid1Devesh Pratap Singh2Ashok Kumar Das3Joel J. P. C. Rodrigues4Youngho Park5Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248 002, IndiaDepartment of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248 002, IndiaDepartment of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248 002, IndiaCenter for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, IndiaFederal University of Piauí (UFPI), 64049-550 Teresina-Pi, BrazilSchool of Electronics Engineering, Kyungpook National University, Daegu 41566, KoreaThe sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes (<inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>s) have some properties (for example, they first attract the other normal nodes for the shortest path to the destination and when normal nodes initiate the process of sending their packets through that path (i.e., via <inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>), the attacker nodes start disrupting the traffic flow of the network). In the presence of <inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>s, the destination (for example, sink node i.e., gateway/base station) does not receive the required information or it may receive partial or modified information. This results in reduction of the network performance and degradation in efficiency and reliability of the communication. In the presence of such an attack, the throughput decreases, end-to-end delay increases and packet delivery ratio decreases. Moreover, it may harm other network performance parameters. Hence, it becomes extremely essential to provide an effective and competent scheme to mitigate this attack in EIoT. In this paper, an intrusion detection scheme to protect EIoT environment against sinkhole attack is proposed, which is named as SAD-EIoT. In SAD-EIoT, the resource rich edge nodes (edge servers) perform the detection of different types of sinkhole attacker nodes with the help of exchanging messages. The practical demonstration of SAD-EIoT is also provided using the well known NS2 simulator to compute the various performance parameters. Additionally, the security analysis of SAD-EIoT is conducted to prove its resiliency against various types of <inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>s. SAD-EIoT achieves around <inline-formula> <math display="inline"> <semantics> <mrow> <mn>95.83</mn> <mo>%</mo> </mrow> </semantics> </math> </inline-formula> detection rate and <inline-formula> <math display="inline"> <semantics> <mrow> <mn>1.03</mn> <mo>%</mo> </mrow> </semantics> </math> </inline-formula> false positive rate, which are considerably better than other related existing schemes. Apart from those, SAD-EIoT is proficient with respect to computation and communication costs. Eventually, SAD-EIoT will be a suitable match for those applications which can be used in critical and sensitive operations (for example, surveillance, security and monitoring systems).https://www.mdpi.com/1424-8220/20/5/1300sinkhole attackinternet of things (iot)intrusion detectionedge computingns2 simulationsecurity
collection DOAJ
language English
format Article
sources DOAJ
author Sumit Pundir
Mohammad Wazid
Devesh Pratap Singh
Ashok Kumar Das
Joel J. P. C. Rodrigues
Youngho Park
spellingShingle Sumit Pundir
Mohammad Wazid
Devesh Pratap Singh
Ashok Kumar Das
Joel J. P. C. Rodrigues
Youngho Park
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
Sensors
sinkhole attack
internet of things (iot)
intrusion detection
edge computing
ns2 simulation
security
author_facet Sumit Pundir
Mohammad Wazid
Devesh Pratap Singh
Ashok Kumar Das
Joel J. P. C. Rodrigues
Youngho Park
author_sort Sumit Pundir
title Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
title_short Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
title_full Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
title_fullStr Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
title_full_unstemmed Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
title_sort designing efficient sinkhole attack detection mechanism in edge-based iot deployment
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2020-02-01
description The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes (<inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>s) have some properties (for example, they first attract the other normal nodes for the shortest path to the destination and when normal nodes initiate the process of sending their packets through that path (i.e., via <inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>), the attacker nodes start disrupting the traffic flow of the network). In the presence of <inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>s, the destination (for example, sink node i.e., gateway/base station) does not receive the required information or it may receive partial or modified information. This results in reduction of the network performance and degradation in efficiency and reliability of the communication. In the presence of such an attack, the throughput decreases, end-to-end delay increases and packet delivery ratio decreases. Moreover, it may harm other network performance parameters. Hence, it becomes extremely essential to provide an effective and competent scheme to mitigate this attack in EIoT. In this paper, an intrusion detection scheme to protect EIoT environment against sinkhole attack is proposed, which is named as SAD-EIoT. In SAD-EIoT, the resource rich edge nodes (edge servers) perform the detection of different types of sinkhole attacker nodes with the help of exchanging messages. The practical demonstration of SAD-EIoT is also provided using the well known NS2 simulator to compute the various performance parameters. Additionally, the security analysis of SAD-EIoT is conducted to prove its resiliency against various types of <inline-formula> <math display="inline"> <semantics> <mrow> <mi>S</mi> <mi>H</mi> <mi>A</mi> </mrow> </semantics> </math> </inline-formula>s. SAD-EIoT achieves around <inline-formula> <math display="inline"> <semantics> <mrow> <mn>95.83</mn> <mo>%</mo> </mrow> </semantics> </math> </inline-formula> detection rate and <inline-formula> <math display="inline"> <semantics> <mrow> <mn>1.03</mn> <mo>%</mo> </mrow> </semantics> </math> </inline-formula> false positive rate, which are considerably better than other related existing schemes. Apart from those, SAD-EIoT is proficient with respect to computation and communication costs. Eventually, SAD-EIoT will be a suitable match for those applications which can be used in critical and sensitive operations (for example, surveillance, security and monitoring systems).
topic sinkhole attack
internet of things (iot)
intrusion detection
edge computing
ns2 simulation
security
url https://www.mdpi.com/1424-8220/20/5/1300
work_keys_str_mv AT sumitpundir designingefficientsinkholeattackdetectionmechanisminedgebasediotdeployment
AT mohammadwazid designingefficientsinkholeattackdetectionmechanisminedgebasediotdeployment
AT deveshpratapsingh designingefficientsinkholeattackdetectionmechanisminedgebasediotdeployment
AT ashokkumardas designingefficientsinkholeattackdetectionmechanisminedgebasediotdeployment
AT joeljpcrodrigues designingefficientsinkholeattackdetectionmechanisminedgebasediotdeployment
AT younghopark designingefficientsinkholeattackdetectionmechanisminedgebasediotdeployment
_version_ 1724983904696270848