The rapidly expanding nature of the Internet of Things (IoT) networks is beginning to attract interest across a range of applications, including smart homes, smart transportation, smart health, and industrial contexts. This cutting-edge technology enables individuals to track and control their integrated environment in real-time and remotely via a thousand IoT devices comprised of sensors and actuators that actively participate in sensing, processing, storing, and sharing information. Nonetheless, IoT devices are frequently deployed in hostile environments, wherein adversaries attempt to capture and breach them in order to seize control of the entire network. One such example of potentially malicious behaviour is the cloning of IoT devices, in which an attacker can physically capture the devices, obtain some sensitive information, duplicate the devices, and intelligently deploy them in desired locations to conduct various insider attacks. A device cloning attack on IoT networks is a significant security concern since it allows for selective forwarding, sink-hole, and black-hole attacks. To address this issue, this paper provides an efficient scheme for detecting clone node attacks on IoT networks that makes use of semantic information about IoT devices known as context information sensed from the deployed environment to locate them securely. We design a location proof mechanism by combining location proofs and batch verification of the extended elliptic curve digital signature technique to accelerate the verification process at selected trusted nodes. We demonstrate the security of our scheme and its resilience to secure clone node attack detection by conducting a comprehensive security analysis. The performance of our proposed scheme provides a high degree of detection accuracy with minimal detection time and significantly reduces the computation, communication and storage overhead.
翻译:互联网(IOT)网络的迅速扩大性质开始在一系列应用中引起人们的兴趣,这些应用包括智能家庭、智能运输、智能健康和工业环境。这种尖端技术使个人能够实时和远程跟踪和控制其综合环境,通过由传感器和推动器组成的一千个IOT装置,积极参与遥感、处理、储存和分享信息。尽管如此,IOT装置经常部署在敌对环境中,对手试图捕捉和破坏这些装置,以夺取整个网络的控制。这种潜在恶意行为的最起码例子是IOT装置的克隆,其中攻击者可以实际捕捉装置,获得一些敏感信息,复制装置,并明智地在理想地点部署这些装置,进行各种内部攻击。对IOT网络的克隆攻击是一个重大安全问题,因为它允许有选择的转发、下水道和黑洞攻击。为了解决这一问题,本文提供了一种有效的机制,用以探测IOT网络的克隆节点攻击,使使用有关IOT装置的精密信息可以实际获取,获得一些敏感信息,复制这些装置,并明智地将其部署在各种内部攻击地点部署的环境进行克隆核查。我们所选择的安全性核查过程,我们所选择的安全性核查,以安全性核查一个安全性标记。我们所选取的安全性核查系统。我们的安全性能和感测测测测路,我们用一个安全性测测测路,以安全性能、测路,以安全性测测测路。