An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)

被引:0
|
作者
Hussain, Muhammad Zunnurain [1 ]
Hanapi, Zurina Mohd [1 ]
Abdullah, Azizol [1 ]
Hussin, Masnida [1 ]
Ninggal, Mohd Izuan Hafez [2 ]
机构
[1] Univ Putra Malaysia UPM, Fac Comp Sci & Informat Technol, Dept Commun Technol, Serdang, Malaysia
[2] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Dept Comp Sci, Serdang, Malaysia
关键词
Security; Threats; IoT; Network; Sybil attack; IDS; Routing; SF-MRTS; Energy conservation; Digital landscape; LOW-POWER; INTERNET; IOT; PROTOCOL; THINGS;
D O I
10.7717/peerj-cs.2231
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. Using such a new way of calculating node reliability, we introduce a cutting-edge approach, evaluating parameters beyond routing metrics like energy conservation and actuality. SF-MRTS works precisely towards achieving a trusted network by introducing such trust metrics on secure paths. Therefore, this may be considered more likely to withstand the attacks because of these security improvements. The simulation function of SF-MRTS clearly shows its concordance with the security risk management features, which are also necessary for the network's performance and stability maintenance. These mechanisms are based on the principles of game theory, and they allocate attractions to the nodes that cooperate while imposing penalties on the nodes that do not. This will be the way to avoid damage to the network, and it will lead to collaboration between the nodes. SF-MRTS is a security technology for emerging industrial Internet of Things (IoT) network attacks. It effectively guaranteed reliability and improved the networks' resilience in different scenarios.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
    Hussain, Muhammad Zunnurain
    Hanapi, Zurina Mohd
    Abdullah, Azizol
    Hussin, Masnida
    Ninggal, Mohd Izuan Hafez
    PeerJ Computer Science, 2024, 10
  • [2] Trust-Aware Sybil Attack Detection for Resilient Vehicular Communication
    Morton, Thomas L.
    Borah, Abinash
    Paranjothi, Anirudh
    INTERNET TECHNOLOGY LETTERS, 2024,
  • [3] An Optimisation driven Deep Residual Network for Sybil attack detection with reputation and trust-based misbehaviour detection in VANET
    Velayudhan, Nitha C.
    Anitha, A.
    Madanan, Mukesh
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (05) : 721 - 744
  • [4] DTMS: A Dual Trust-Based Multi-level Sybil Attack Detection Approach in WSNs
    Khan, Tayyab
    Singh, Karan
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (03) : 1389 - 1420
  • [5] Review on Detection and Mitigation of Sybil attack in the network
    Bhise, Arpita M.
    Kamble, Shailesh D.
    1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 395 - 401
  • [6] Trust Based Energy Efficient Detection and Avoidance of Black Hole Attack to Ensure Secure Routing in MANET
    Biswas, Suparna
    Nag, Tanumoy
    Neogy, Sarmistha
    2014 APPLICATIONS AND INNOVATIONS IN MOBILE COMPUTING (AIMOC), 2014, : 157 - 164
  • [7] Trust-based anomalous system call detection
    Peng, Shufen
    He, Jingsha
    ADVANCING SCIENCE THROUGH COMPUTATION, 2008, : 413 - 417
  • [8] Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET
    Kaur, Gurjot
    Kakkar, Deepti
    AD HOC NETWORKS, 2022, 136
  • [9] Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET
    Kaur, Gurjot
    Kakkar, Deepti
    Ad Hoc Networks, 2022, 136
  • [10] Develop Trust-Based Energy Routing Protocol for Energy Efficient with Secure Transmission
    Devi, R. Renuga
    Sethukarasi, T.
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 123 (03) : 2835 - 2862