Visible to the public New LQR Protocols with Intrusion Detection Schemes for IOT Security

TitleNew LQR Protocols with Intrusion Detection Schemes for IOT Security
Publication TypeConference Paper
Year of Publication2017
AuthorsJiang, J., Chaczko, Z., Al-Doghman, F., Narantaka, W.
Conference Name2017 25th International Conference on Systems Engineering (ICSEng)
KeywordsBase stations, composability, Estimation, Human Behavior, human factors, Internet of Things, IoT security, Link Quality Routing, Metrics, Monitoring, network intrusion detection, pubcrawl, Resiliency, Routing, Routing protocols, Wireless communication, Wireless Sensor Network, Wireless sensor networks

Link quality protocols employ link quality estimators to collect statistics on the wireless link either independently or cooperatively among the sensor nodes. Furthermore, link quality routing protocols for wireless sensor networks may modify an estimator to meet their needs. Link quality estimators are vulnerable against malicious attacks that can exploit them. A malicious node may share false information with its neighboring sensor nodes to affect the computations of their estimation. Consequently, malicious node may behave maliciously such that its neighbors gather incorrect statistics about their wireless links. This paper aims to detect malicious nodes that manipulate the link quality estimator of the routing protocol. In order to accomplish this task, MINTROUTE and CTP routing protocols are selected and updated with intrusion detection schemes (IDSs) for further investigations with other factors. It is proved that these two routing protocols under scrutiny possess inherent susceptibilities, that are capable of interrupting the link quality calculations. Malicious nodes that abuse such vulnerabilities can be registered through operational detection mechanisms. The overall performance of the new LQR protocol with IDSs features is experimented, validated and represented via the detection rates and false alarm rates.

Citation Keyjiang_new_2017