Detecting malicious proxy nodes during IoT network joining phase

Computer Networks(2024)

引用 0|浏览0
暂无评分
摘要
During the joining phase of an IoT network, when a node plays the role of a proxy node, it becomes responsible for forwarding Join Requests and Join Responses between the joining node and the network coordinator. If a proxy node is malicious, it has the potential to prevent new nodes from joining the network or direct them toward another entity impersonating the coordinator. Therefore, the joining phase is a critical stage for ensuring network security.In this paper, a robust system for detecting malicious proxy nodes during the joining phase is presented. This solution involves the coordinator maintaining a log table that records the participation frequency of each node as a proxy node. Following each joining phase, the coordinator receives a lightweight end-to-end encrypted packet from the joining node, containing information about any malicious proxy nodes encountered during the joining process. Having these data, the system calculates the number of legitimate proxy node participation for each node. The detection system utilizes these factors, along with a range of tunable parameters, to categorize nodes as either malicious or honest. Furthermore, this solution takes into account various potential attacks on the detection process, originating from both proxy nodes and joining nodes.This solution was integrated with a previously proposed consensus-based authentication mechanism for the 6TiSCH protocol. The evaluation includes both theoretical analysis and simulations, taking into consideration diverse parameters and attack scenarios. The results from the theoretical analysis align with the simulation outcomes, confirming the efficacy of our detection system in identifying malicious nodes and its resilience against potential attacks.
更多
查看译文
关键词
Anomaly detection,Detection system,Trust management,Joining phase,Security,IoT,6TiSCH
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要