A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT

Noshina Tariq, Muhammad Asim, Zakaria Maamar, M. Zubair Farooqi, Noura Faci, Thar Baker

Research output: Contribution to journalArticlepeer-review

Abstract

The ubiquitous use of Internet-of-Things (IoT) is enabling a new era of wireless Sensor Nodes (SNs) that can be subject to attacks like any other piece of hardware and software. Unfortunately, an open and challenging issue is to what extent legitimate SNs can be trusted. This paper presents an energy-efficient, software-defined-network-based Mobile Code-driven Trust Mechanism (MCTM) for addressing this issue by assessing trust of SNs based on their forwarding behaviors. MCTM uses mobile code to visit the SNs based on pre-defined itineraries while collecting necessary details about these SNs in preparation for assessing their trust. The results gained from the experiments demonstrate a superior performance over a state-of-art technique that is energy-efficient management based on Software-Defined Network (SDN) for SNs. Message overhead is reduced by approximately 50%, which results in consuming less energy when detecting malicious SNs.

Original languageEnglish
Pages (from-to)198-206
Number of pages9
JournalJournal of Parallel and Distributed Computing
Volume134
DOIs
Publication statusPublished - 7 Sept 2019

Bibliographical note

Publisher Copyright:
© 2019 Elsevier Inc.

Keywords

  • Energy
  • Internet of Things
  • Mobile code
  • Sensor node
  • Trust

Fingerprint

Dive into the research topics of 'A Mobile Code-driven Trust Mechanism for detecting internal attacks in sensor node-powered IoT'. Together they form a unique fingerprint.

Cite this