The Internet of Things, also known as the IoT, refers to the billions of devices around the world that are now connected to the Internet, collecting and sharing data. The amount of data collected through IoT sensors must be completely securely controlled. To protect the information collected by IoT sensors, a lightweight method called Discover the Flooding Attack-RPL (DFA-RPL) has been proposed. The proposed DFA-RPL method identifies intrusive nodes in several steps to exclude them from continuing routing operations. Thus, in the DFA-RPL method, it first builds a cluster and selects the most appropriate node as a cluster head in DODAG, then, due to the vulnerability of the RPL protocol to Flooding attacks, it uses an ant colony algorithm (ACO) using five steps to detect attacks. Use Flooding to prevent malicious activity on the IoT network. In other words, if it detects a node as malicious, it puts that node on the detention list and quarantines it for a certain period of time. The results obtained from the simulation show the superiority of the proposed method in terms of Packet Delivery Rate, Detection Rate, False Positive Rate, and False Negative Rate compared to IRAD and REATO methods.
翻译:互联网“物的互联网”,又称“IoT”,指世界各地数十亿个现在与互联网连接的装置,收集和分享数据;通过IoT传感器收集的数据数量必须完全安全地控制;为保护IoT传感器收集的信息,提议了一种叫“发现洪水袭击-RPL(DFA-RPL)”的轻量方法;拟议的DFA-RPL方法在几个步骤中确定了侵扰节点,以阻止它们继续运行路线作业;因此,在DFA-RPL方法中,它首先在DODG中建立一个集群,并选择最合适的节点作为集群头,然后,由于RPL协议对洪水袭击的脆弱性,它使用蚂蚁群算法(ACO),使用五个步骤来检测袭击;使用FoT网络的洪水来防止恶意活动;换句话说,如果发现一个节点是恶意的,它就会在拘留名单上添加节点,并在一段时间内将其隔离。