مقاله انگلیسی یک سیستم تشخیص نفوذ نرم افزاری برای شبکه های اینترنت اشیا مبتنی بر RPL
ترجمه نشده

مقاله انگلیسی یک سیستم تشخیص نفوذ نرم افزاری برای شبکه های اینترنت اشیا مبتنی بر RPL

عنوان فارسی مقاله: یک سیستم تشخیص نفوذ نرم افزاری برای شبکه های اینترنت اشیا مبتنی بر RPL
عنوان انگلیسی مقاله: A Softwarized Intrusion Detection System for the RPL-based Internet of Things networks
مجله/کنفرانس: نسل آینده سیستم های کامپیوتری - Future Generation Computer Systems
رشته های تحصیلی مرتبط: مهندسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های تحصیلی مرتبط: اینترنت و شبکه های گسترده، امنیت اطلاعات، شبکه های کامپیوتری
کلمات کلیدی فارسی: اینترنت اشیا، پروتکل RPL، حملات RPL، امنیت اینترنت اشیا، سیستم تشخیص نفوذ
کلمات کلیدی انگلیسی: Internet of Things - RPL protocol - RPL attacks - IoT security - Intrusion Detection System
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
نمایه: Scopus - Master Journals List - JCR
شناسه دیجیتال (DOI): https://doi.org/10.1016/j.future.2021.07.013
دانشگاه: Department of Applied Informatics, University of Macedonia, Thessaloniki, Greece
صفحات مقاله انگلیسی: 17
ناشر: الزویر - Elsevier
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2021
ایمپکت فاکتور: 9.110 در سال 2020
شاخص H_index: 119 در سال 2021
شاخص SJR: 1.262 در سال 2020
شناسه ISSN: 0167-739X
شاخص Quartile (چارک): Q1 در سال 2020
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
آیا این مقاله فرضیه دارد: ندارد
کد محصول: E15960
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Highlights

Abstract

Keywords

1. Introduction

2. Background

3. Proposed system

4. Evaluation results

5. Related works

Conclusion

CRediT authorship contribution statement

Declaration of Competing Interest

Acknowledgments

References

Vitae

بخشی از مقاله (انگلیسی)

Abstract

Internet of Things (IoT) constitutes a pivotal contributor to the Industry 4.0 (I 4.0) vision, technologically transforming production and societies. It enables novel services through the seamless integration of devices, such as motes carrying sensors, with the Internet. However, the broad adoption of IoT technologies is facing security issues due to the direct access to the devices from the Internet, the broadcasting nature of the wireless media, and the potential unattended operation of relevant deployments. In particular, the Routing over Low Power and Lossy Networks (RPL) protocol, a prominent IoT solution, is vulnerable to a large number of attacks, both of general-purpose and RPL-specific nature, while the resource-constraints of the corresponding devices are making attack mitigation even more challenging, e.g., in terms of involved control overhead and detection accuracy.

In this paper, we introduce ASSET, a novel Intrusion Detection System (IDS) for RPL with diverse profiles to tackle the above issues that mitigate at least 13 attacks. At the same time, other solutions go up to eight. ASSET, inspired by the network softwarization paradigm, supports a novel, extendable workflow, bringing together three anomaly-detection and four RPL specification-based mechanisms, a novel attacker identification process, as well as multiple attack mitigation strategies. Our IDS also supports an adaptable control & monitoring protocol, trading overhead for accuracy, depending on the network conditions. The proof-of-concept experiments show that ASSET entails a low overhead for the different modes of operation it supports (i.e., 6.28 percent on average) compared to other solutions reaching up to 30 percent. At the same time, it also keeps the power consumption at acceptable levels (from 0.18 up to 1.54 percent more). Moreover, it provides 100 percent accuracy for specific attacks and can identify the attacker in far more attacks than any other similar solution.



1. Introduction

Internet of Things (IoT) does rapidly develop and, among others, is the technological enabler for smart-x ecosystems and the next-generation advanced manufacturing, referred to as I 4.0 (Industry 4.0), that includes smart products, smart production, and smart services. Indeed, recent advances in communication technology, e.g., 5G Networks, along with the Industrial IoT (IIoT), evolve the request for mass production and automation from the principle idea to connect everything in the production chain to the more sophisticated context of broader and more fine-grained interconnections [1]. For example, a network of geographically distributed factory branches requires sharing resources and assets to improve orders’ fulfillment.