Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks

2017 ◽  
Vol 29 (4) ◽  
pp. e3183 ◽  
Author(s):  
Qussai Yaseen ◽  
Firas Albalas ◽  
Yaser Jararwah ◽  
Mahmoud Al-Ayyoub
Author(s):  
Fatma Gara ◽  
Leila Ben Saad ◽  
Rahma Ben Ayed

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors design, implement, and evaluate a novel intrusion detection system for mobile wireless sensor networks based on IPv6 routing protocol for low power and lossy networks. The new intrusion detection system can be extended to other attacks such as wormhole and sybil attacks. The simulations results show that the detection probability is 100% for selective attackers under some cases.


2020 ◽  
pp. 556-581
Author(s):  
Fatma Gara ◽  
Leila Ben Saad ◽  
Rahma Ben Ayed

Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors design, implement, and evaluate a novel intrusion detection system for mobile wireless sensor networks based on IPv6 routing protocol for low power and lossy networks. The new intrusion detection system can be extended to other attacks such as wormhole and sybil attacks. The simulations results show that the detection probability is 100% for selective attackers under some cases.


2020 ◽  
pp. 9
Author(s):  
عمار محمد أبو زنيد ◽  
عين الدين واحد عبدالوهاب ◽  
محمد إدريس اليمني ◽  
عمر عادل مهدي ◽  
ليانا خميس قباجة

Sign in / Sign up

Export Citation Format

Share Document