A Black Hole Attack Protection Approach in IoT-Based Applications Using RLNC

A Black Hole Attack Protection Approach in IoT-Based Applications Using RLNC

Abidhusain Syed, Baswaraj Gadgay
Copyright: © 2023 |Pages: 15
DOI: 10.4018/979-8-3693-1528-6.ch009
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Smart environments have recently transformed the standard of human existence by increasing comfort and efficiency. IoT, or the internet of things, has become an instrument for developing intelligent environments. But because of security vulnerabilities in IoT-based systems, applications for smart environments are in danger. Harmful items have a significant effect on cyber defence mechanisms. In order to stop security attacks against IoT that exploit some of these security vulnerabilities, IoT-specific intrusion detection systems (IDSs) are crucial. Due to the limited computing and storage capacities of IoT devices and the specific protocols used, it's conceivable that conventional IDSs are not an option for IoT environments.
Chapter Preview
Top

1. Introduction

The most recent trends and updates notify us of the fast-growing IoT population that is connecting to the internet all around the world. The risk associated with cybersurveillance has increased, and malicious programmes now have access to personal data. Inappropriate system key usage and a dearth of system modernisation are to blame. The database was mostly cracked as a result of authoritarian surveillance measures that were put in place. According to a network surveillance expert, the IoT is especially susceptible to cyber invasion. It'sa result of inadequate surveillance regulations and practises. Numerous types of malware have been developed by hackers to compromise IoT devices. To get consumers to reveal personal information, hackers send deceptive emails that appear to be from reliable companies (Monther, A.A.& Tawalbeh,2020). The implementation of IoT encompasses numerous sectors such as resourceful homes, smart supply chains, customizable environments, and intelligent monitoring (A. V. Dastjerdi and R. Buyya, 2016; J. Li.et.a,2019), so network surveillance is obvious. There are a number of cybersurveillance risks for enterprises when real items are included in wireless networks. Denial of Service (DoS), Man-in-the-Middle (MITM), and other tactics can be used against crucial IoT infrastructures to bring down the entire system and compromise it. IDS plays a crucial role as a key element in the IoT surveillance architecture for information systems and traditional networks to overcome these difficulties. Therefore, it is essential to develop a high-performance IoT invasion detection system element in order to increase the surveillance of the IoT (Z. Jinsheng 2018).

The four main groups of surveillance-related issues for IoT systems are authentication and physical threats, secrecy risks, data integrity issues, and privacy concerns (Liu et al., 2017). Figure 1 depicts the relationships among these categories. The following succinct discussion addresses the surveillance issues that arise in the various IoT levels.

  • 1.

    Authentication and physical threats are fundamental issues faced by IoT system.

  • 2.

    These are the risks associated with confidentiality between IoT devices and the gateways in the network layer (Trappe W, Howard R & Moore RS, 2015).

  • 3.

    Data consistency across apps and services When spoofing attacks or noise influence an IoT device, data integrity issues arise.

  • 4.

    The fourth category of challenges has to do with privacy. In IoT networks, information privacy is a crucial component of surveillance (Hassan AM, Awad AI, 2018).

Figure 1.

Surveillance challenges in various IoT layers

979-8-3693-1528-6.ch009.f01
Top

2. Background

The intricacy of modern convocation (such online gaming, video conferencing etc) that demand consistent QoS assurances has increased the need for precise and timely network monitoring tools. This makes monitoring network performance easier for network engineers and Internet service providers (ISPs). There are many crucial network elements to comprehend and account for, including loss rate, delay distribution, bandwidth availability, and origin-destination traffic. Only a few of these traits, such origin-destination traffic, may, however, be directly retrieved from network hardware viz switches and routers. The direct evaluation of some characteristics by network devices, however, includes the link-level loss rate, delay distribution, and available bandwidth. It is often impractical to do so in a large network spanning many independent systems due to security and other factors. Data packet buffering during the route discovery process might also cause packet losses as a result of buffer overflow. With single link routing, this problem becomes severe as the network becomes more dynamic. As the rate of connection failures rises, so does the frequency of route discoveries. Additionally, as each route discovery results in significant packet overhead, its frequency affects the network's QoS performance.

Complete Chapter List

Search this Book:
Reset