New LQR protocols with intrusion detection schemes for IOT security

Publication Type:
Conference Proceeding
Citation:
Proceedings - 25th International Conference on Systems Engineering, ICSEng 2017, 2017, 2017-January pp. 466 - 474
Issue Date:
2017-11-27
Metrics:
Full metadata record
Files in This Item:
Filename Description Size
08121711.pdfPublished version457.48 kB
Adobe PDF
© 2017 IEEE. Link quality protocols employ link quality estimators to collect statistics on the wireless link either independently or cooperatively among the sensor nodes. Furthermore, link quality routing protocols for wireless sensor networks may modify an estimator to meet their needs. Link quality estimators are vulnerable against malicious attacks that can exploit them. A malicious node may share false information with its neighboring sensor nodes to affect the computations of their estimation. Consequently, malicious node may behave maliciously such that its neighbors gather incorrect statistics about their wireless links. This paper aims to detect malicious nodes that manipulate the link quality estimator of the routing protocol. In order to accomplish this task, MINTROUTE and CTP routing protocols are selected and updated with intrusion detection schemes (IDSs) for further investigations with other factors. It is proved that these two routing protocols under scrutiny possess inherent susceptibilities, that are capable of interrupting the link quality calculations. Malicious nodes that abuse such vulnerabilities can be registered through operational detection mechanisms. The overall performance of the new LQR protocol with IDSs features is experimented, validated and represented via the detection rates and false alarm rates.
Please use this identifier to cite or link to this item: