ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
ABSTRACT
There are currently more objects connected to the Internet than people in the world. This gap will continue to grow, as more objects gain the ability to directly interface with the Internet. Providing security in IoT is challenging as the devices are resource constrained, the communication links are lossy, and the devices use a set of novel IoT technologies such as RPL and 6LoWPAN. Due to this it is easy to attack in IoT network. The proposed system is a novel intrusion detection system for the IoT, which is capable of detecting dDOS attack and attacker. The proposed methods use the location information of node and neighbor information to identify the attack and received signal strength to identify attacker nodes. Design of such system will help in securing the IoT network and may prevents such attacks. This method is very energy efficient and only takes fixed number of UDP packets for attack detection; hence it is beneficial for resource constrained environment.
VI.CONCLUSION AND FUTURE WORK
Considering the potential applications of the IoT it is important that 6LoWPAN networks are protected against internal and external intrusions. This work concludes that, the proposed novel light weight IDS system is basically designed for resource constrained sensor nodes and able to detect Denial of Service attacks of two kind packet relay and encapsulation. Mostly centralized modules are used for doing heavy processing and Light weight modules run on sensor nodes causing saving of energy on sensor nodes. Adding location information of nodes made system more efficient for detection of wormhole attack with lesser overhead and with high true positive detection rate. This method takes fixed number of UDP packets for attack detection. The RAM/ROM consumption is also very small as compared to total available sizes. The method give 94% detection rate which is very good for resource constrained environment. In future, we expect to complete the implementation of our proposed architecture and test it against different real attacks. Apart from this, the proposed architecture can be further improved by the following: Distributed Approach; To monitor large networks distributed sniffing, detection mechanisms are required. Security Incident and Event management system (SIEM) once the IDS detect some alerts, this raw information can be accessed by certain alert management software. These tools provide effective statistics and various notifying options to the administrators via email, sms, etc. In future, extending support to SIEMs will be considered. Finally, a centralized monitoring system could be designed such that all network management information from ebbits network manager and IDS alerts could be monitored. After detecting a DoS attack, specific mechanisms can be designed to defend the attack i.e., the intrusion prevention systems (IPS).