Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Securing Internet of Things against Physical Layer Attacks Using Hybrid Security Algorithm (HSA)

Version 1 : Received: 23 January 2020 / Approved: 26 January 2020 / Online: 26 January 2020 (03:57:09 CET)

How to cite: Zarei, M. Securing Internet of Things against Physical Layer Attacks Using Hybrid Security Algorithm (HSA). Preprints 2020, 2020010303. https://doi.org/10.20944/preprints202001.0303.v1 Zarei, M. Securing Internet of Things against Physical Layer Attacks Using Hybrid Security Algorithm (HSA). Preprints 2020, 2020010303. https://doi.org/10.20944/preprints202001.0303.v1

Abstract

Through the Internet of Things (IoT) the internet scope is established by the aid of physical objects integration to classify themselves to mutual things. A physical object can be created by this inventive perception to signify itself in the digital world. Regarding the physical objects that are related to the internet, it is worth to mention that considering numerous theories and upcoming predictions, they mostly require protected structures, moreover, they are at risk of several attacks. IoTs are endangered by particular routing disobedience called physical layer attack owing to their distributed features. The physical layer attack as a security warning makes possible for the invader to abuse the resources and bandwidth of the network through overloading the network via unimportant packets. This protocol is called LSFA-IoT consisting of two key sections of the physical layer detection system and misbehavior detection system. The first section is utilized in stabilizing the status of the network. The second section is in charge of discovering the misbehavior sources within the IoT network through , the Average Packet Transmission RREQ. By detecting a malicious node, the status of the node is checked by LSFA-IoT prior to sending a data packet and in case detecting the node as malicious, no packet is sent to that node and that node is added to the detention list. Here, the technique is assessed through wide simulations performed within the NS-3 environment. Based on the results of the simulation, it is indicated that the IoT network behaviour metrics are enhanced based on the detection rate, false-negative rate, false-positive rate, and packet delivery rate.

Keywords

Internet of Things (IoT); physical layer attack; routing security; Average Packet Transmission

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.