Volume 11, Issue 4, June 2015, Pages 894–907
Anass RGHIOUI1, Anass KHANNOUS2, and Mohammed BOUHORMA3
1 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
2 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
3 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
Original language: English
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Even when 6LoWPAN has an ideal cryptography line defense, it is still necessary to implement an intrusion detection system (IDS) to deal with threats targeting network performance such as DoS attacks. IDS discover and stop most attacks that make changes on the operation of the network. However, few IDS solution has been proposed for 6LoWPAN networks. IDS missions are to monitor and raise an alarm about any possible threats and pass it to the system to restart the keying process for eliminating the attackers. New technique has been proposed recently based on the principle that neighbor nodes have a trend to have the same behavior, so the detection of the malicious node is based on the detection of the abnormal node that has a bad behavior different than it neighbors. The security goal is to provide a monitoring system that will attempt to detect anomalous malicious behavior and to prevent it from harming the network performance basing on the neighbors nodes behavior monitoring.
Author Keywords: 6LoWPAN, RPL, IDS, Neighbor-based IDS, Security.
Anass RGHIOUI1, Anass KHANNOUS2, and Mohammed BOUHORMA3
1 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
2 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
3 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
Original language: English
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Even when 6LoWPAN has an ideal cryptography line defense, it is still necessary to implement an intrusion detection system (IDS) to deal with threats targeting network performance such as DoS attacks. IDS discover and stop most attacks that make changes on the operation of the network. However, few IDS solution has been proposed for 6LoWPAN networks. IDS missions are to monitor and raise an alarm about any possible threats and pass it to the system to restart the keying process for eliminating the attackers. New technique has been proposed recently based on the principle that neighbor nodes have a trend to have the same behavior, so the detection of the malicious node is based on the detection of the abnormal node that has a bad behavior different than it neighbors. The security goal is to provide a monitoring system that will attempt to detect anomalous malicious behavior and to prevent it from harming the network performance basing on the neighbors nodes behavior monitoring.
Author Keywords: 6LoWPAN, RPL, IDS, Neighbor-based IDS, Security.
How to Cite this Article
Anass RGHIOUI, Anass KHANNOUS, and Mohammed BOUHORMA, “Monitoring behavior-based Intrusion Detection System for 6loWPAN networks,” International Journal of Innovation and Applied Studies, vol. 11, no. 4, pp. 894–907, June 2015.