RPL (Routing Protocol for Low-power and lossy networks) is a specific routing protocol designed to optimize 6LoWPAN (IPv6 over Low power Wireless Personal Area Network) operation. As 6LoWPAN suffers from resource constraints on battery, processor, memory and bandwidth, it affects the performance of the RPL protocol. From security point of view, this will make RPL vulnerable to several threats directly or indirectly. Thus, cryptographic systems are not sufficient to protect the RPL from internal attacks; a compromised node from the network may cause undesired operation without being detected by these systems. An intrusion detection system (IDS) should be used, but it is not easy given the nature of 6LoWPAN; on a side its resource constraints, and on the other side its opening to the outside world through the Internet.In this paper we focus on denial of service (DoS) attacks, we determine the elements to be taken into account in selecting a compatible IDS and we give some solutions that we consider effective and valid for 6LoWPAN-RPL based networks.
Too many researches have been done using artificial immune systems AIS to solve intrusion detection problems due to several reasons. The self and non-self model based on the Negative Selection Algorithm NSA is the dominant model since it is adopted by the vast majority of these researches. However, this model has some problems especially in terms of scalability and coverage. This paper tries to exploit some interesting concepts proposed by the new danger theory to overcome the problems associated with the self and non-self model. That by improving NSA in order to achieve better detection rates by integrating the basic danger concepts. In this approach, the intrusion detection is related to the damage that can occur in the system and that can be caused by both external elements such as internal elements. The proposed algorithm integrates and combines the basic concepts of intrusion detection systems IDS based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.
Excessive demand and the urgent need for the development of smart cities, evoke the need to provide the capacity for more low-resource devices to communicate and collaborate at a distance, in order to make the concept of the internet more real and practical. For this, IETF "IPv6 over Networks of Resource-constrained Nodes" (6lo) workgroup works on equipment of all resource constrained devices by IPv6 protocol to integrate the internet. From the security point of view, this integration is not without risks, the Internet carries many dangers and current security mechanisms are very greedy for such devices. This paper analyses potential security threats in 6lo as a particular case of mobile ad hoc networks, and provides some countermeasures ideas, in particular, the two principal security defense lines: the cryptography as a first line and the intrusion detection system as the second line.
The use of artificial immune systems (AIS) in intrusion detection is an attractive concept for several reasons. Then it is judicious to expect that approaches of biological inspirations in this area, and specifically the abstraction of immune defense mechanism with its high detection capabilities and its strong defense against intrusion, will probably be able to meet this challenge. Researchers have implemented different immune models to design intrusion detection systems (IDS) in order to secure Mobile Ad Hoc Networks (MANET), but the most popular one is the self and non-self model. This model was used in the vast majority of biological inspiration in the field of MANET security. It has demonstrated attractive success, as well as it showed some weakness especially in terms of scalability and coverage. This paper try to incorporate some additional concepts proposed by the new danger theory in order to overcome some of the problems related to the adoption of the self and non-selfmodel. The proposed algorithm integrates and combines the basic concepts of intrusion detection system based on the role of T cells described by the negative selection algorithm, with those inspired by the role of dendritic cells to process the alarm signals and to judge thereafter whether there is presence of a dangerous element or not.
To lead to the Smart Cities, we should have the possibility of obtaining information from different places and objects anytime and anywhere, in order to collect sufficient data to anticipate problems and take a good decisions. This will promote to an effective and autonomous organization by creating interacted and communicated objects around the city. So, we need to install various and specific IP-based wireless sensors everywhere to collect data remotely and in a real time. The idea of mixing sensors belonging to organizations from different specialties in the same places will involve several experts and encourages competition. But on the other side, it will open the door to new security threats and issues, also this will impose new management problems like how to limit the access to each organization to its sensors. In this paper, we study the security of a set of IP-based wireless sensors, which belongs to different organizations, and form a local network. We propose a model to ensure exchanged information confidentiality and manage the sensors accessibility, while considering the wireless sensors constrained characteristics.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.