Back to Search Start Over

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

Authors :
Baird, Iain
Ghaleb, Baraq
Wadhaj, Isam
Russell, Gordon
Buchanan, William J.
Source :
Electronics (2079-9292); Sep2024, Vol. 13 Issue 17, p3467, 22p
Publication Year :
2024

Abstract

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facilitate efficient data routing. However, RPL networks are susceptible to various security threats, with Sybil and flood attacks being particularly detrimental. Sybil attacks involve malicious nodes generating multiple fake identities to disrupt network operations, while flood attacks overwhelm network resources by inundating them with excessive traffic. This paper proposes a novel mitigation strategy leveraging Bloom filters and hash chains to enhance the security of RPL-based IoT networks against sybil and flood attacks. Extensive simulation and performance analysis demonstrate that this solution significantly reduces the impact of sybil and flood attacks while maintaining a low power consumption profile and low computational overhead. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20799292
Volume :
13
Issue :
17
Database :
Complementary Index
Journal :
Electronics (2079-9292)
Publication Type :
Academic Journal
Accession number :
179646977
Full Text :
https://doi.org/10.3390/electronics13173467