Article (Scientific journals)
Detecting malicious proxy nodes during IoT network joining phase
Haj-Hassan, Ali; Imine, Youcef; Gallais, Antoine et al.
2024In Computer Networks, 243, p. 110308
Peer Reviewed verified by ORBi
 

Files


Full Text
comnet-ali-haj-hassan-2024.pdf
Publisher postprint (3.11 MB)
Request a copy

All documents in ORBi UMONS are protected by a user license.

Send to



Details



Keywords :
6TiSCH; Anomaly detection; Detection system; IoT; Joining phase; Security; Trust management; AND joins; Potential attack; Proxy nodes; Computer Networks and Communications
Abstract :
[en] During the joining phase of an IoT network, when a node plays the role of a proxy node, it becomes responsible for forwarding Join Requests and Join Responses between the joining node and the network coordinator. If a proxy node is malicious, it has the potential to prevent new nodes from joining the network or direct them towards another entity impersonating the coordinator. Therefore, the joining phase is a critical stage for ensuring network security. In this paper, a robust system for detecting malicious proxy nodes during the joining phase is presented. This solution involves the coordinator maintaining a log table that records the participation frequency of each node as a proxy node. Following each joining phase, the coordinator receives a lightweight end-to-end encrypted packet from the joining node, containing information about any malicious proxy nodes encountered during the joining process. Having these data, the system calculates the number of legitimate proxy node participation for each node. The detection system utilizes these factors, along with a range of tunable parameters, to categorize nodes as either malicious or honest. Furthermore, this solution takes into account various potential attacks on the detection process, originating from both proxy nodes and joining nodes. This solution was integrated with a previously proposed consensus-based authentication mechanism for the 6TiSCH protocol. The evaluation includes both theoretical analysis and simulations, taking into consideration diverse parameters and attack scenarios. The results from the theoretical analysis align with the simulation outcomes, confirming the efficacy of our detection system in identifying malicious nodes and its resilience against potential attacks.
Disciplines :
Computer science
Author, co-author :
Haj-Hassan, Ali;  Computer Science Department, University of Mons, Belgium ; Univ. Polytechnique Hauts-de-France, LAMIH, CNRS, UMR 8201, INSA Hauts-de-France, France
Imine, Youcef ;  Univ. Polytechnique Hauts-de-France, LAMIH, CNRS, UMR 8201, INSA Hauts-de-France, France
Gallais, Antoine ;  Univ. Polytechnique Hauts-de-France, LAMIH, CNRS, UMR 8201, INSA Hauts-de-France, France
Quoitin, Bruno  ;  Université de Mons - UMONS > Faculté des Sciences > Service des Réseaux et Télécommunications
Language :
English
Title :
Detecting malicious proxy nodes during IoT network joining phase
Publication date :
April 2024
Journal title :
Computer Networks
ISSN :
1389-1286
eISSN :
1872-7069
Publisher :
Elsevier B.V.
Volume :
243
Pages :
110308
Peer reviewed :
Peer Reviewed verified by ORBi
Research unit :
S802 - Réseaux et Télécommunications
Research institute :
R300 - Institut de Recherche en Technologies de l'Information et Sciences de l'Informatique
Funders :
Bourse UMONS / UPHF
Available on ORBi UMONS :
since 10 January 2025

Statistics


Number of views
1 (0 by UMONS)
Number of downloads
0 (0 by UMONS)

Scopus citations®
 
3
Scopus citations®
without self-citations
3
OpenCitations
 
0
OpenAlex citations
 
2

Bibliography


Similar publications



Contact ORBi UMONS