1. A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT
- Author
-
Noshina Tariq, M. Zubair Farooqi, Muhammad Asim, Thar Baker, Noura Faci, Zakaria Maamar, SZABIST Islamabad, Zayed University, Aalto University School of Science and Technology [Aalto, Finland], Service Oriented Computing (SOC), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Université Claude Bernard Lyon 1 (UCBL), Université de Lyon, and American University of Sharjah
- Subjects
QA75 ,Mobile code ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Theoretical Computer Science ,[INFO.INFO-PF]Computer Science [cs]/Performance [cs.PF] ,Software ,Artificial Intelligence ,Hardware and Architecture ,Sensor node ,0202 electrical engineering, electronic engineering, information engineering ,ComputingMilieux_COMPUTERSANDSOCIETY ,Overhead (computing) ,Wireless ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,020201 artificial intelligence & image processing ,business ,Internet of Things ,ComputingMilieux_MISCELLANEOUS ,Energy (signal processing) ,Computer network - Abstract
The ubiquitous use of Internet-of-Things (IoT) is enabling a new era of wireless Sensor Nodes ( SN s) that can be subject to attacks like any other piece of hardware and software. Unfortunately, an open and challenging issue is to what extent legitimate SN s can be trusted. This paper presents an energy-efficient, software-defined-network-based Mobile Code-driven Trust Mechanism ( MCTM ) for addressing this issue by assessing trust of SN s based on their forwarding behaviors. MCTM uses mobile code to visit the SN s based on pre-defined itineraries while collecting necessary details about these SN s in preparation for assessing their trust. The results gained from the experiments demonstrate a superior performance over a state-of-art technique that is energy-efficient management based on Software-Defined Network ( SDN ) for SN s. Message overhead is reduced by approximately 50%, which results in consuming less energy when detecting malicious SN s.
- Published
- 2019
- Full Text
- View/download PDF