Your browser doesn't support javascript.
loading
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN).
Hussain, Muhammad Zunnurain; Hanapi, Zurina Mohd; Abdullah, Azizol; Hussin, Masnida; Ninggal, Mohd Izuan Hafez.
Affiliation
  • Hussain MZ; Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Universiti Putra Malaysia, Serdang, Malaysia.
  • Hanapi ZM; Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Universiti Putra Malaysia, Serdang, Malaysia.
  • Abdullah A; Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Universiti Putra Malaysia, Serdang, Malaysia.
  • Hussin M; Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Universiti Putra Malaysia, Serdang, Malaysia.
  • Ninggal MIH; Department of Computer Science, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, Selangor, Malaysia.
PeerJ Comput Sci ; 10: e2231, 2024.
Article in En | MEDLINE | ID: mdl-39145209
ABSTRACT
In the modern digital market flooded by nearly endless cyber-security hazards, sophisticated IDS (intrusion detection systems) can become invaluable in defending against intricate security threats. Sybil-Free Metric-based routing protocol for low power and lossy network (RPL) Trustworthiness Scheme (SF-MRTS) captures the nature of the biggest threat to the routing protocol for low-power and lossy networks under the RPL module, known as the Sybil attack. Sybil attacks build a significant security challenge for RPL networks where an attacker can distort at least two hop paths and disrupt network processes. Using such a new way of calculating node reliability, we introduce a cutting-edge approach, evaluating parameters beyond routing metrics like energy conservation and actuality. SF-MRTS works precisely towards achieving a trusted network by introducing such trust metrics on secure paths. Therefore, this may be considered more likely to withstand the attacks because of these security improvements. The simulation function of SF-MRTS clearly shows its concordance with the security risk management features, which are also necessary for the network's performance and stability maintenance. These mechanisms are based on the principles of game theory, and they allocate attractions to the nodes that cooperate while imposing penalties on the nodes that do not. This will be the way to avoid damage to the network, and it will lead to collaboration between the nodes. SF-MRTS is a security technology for emerging industrial Internet of Things (IoT) network attacks. It effectively guaranteed reliability and improved the networks' resilience in different scenarios.
Key words

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: PeerJ Comput Sci Year: 2024 Document type: Article Affiliation country: Malaysia Country of publication: EEUU / ESTADOS UNIDOS / ESTADOS UNIDOS DA AMERICA / EUA / UNITED STATES / UNITED STATES OF AMERICA / US / USA

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: PeerJ Comput Sci Year: 2024 Document type: Article Affiliation country: Malaysia Country of publication: EEUU / ESTADOS UNIDOS / ESTADOS UNIDOS DA AMERICA / EUA / UNITED STATES / UNITED STATES OF AMERICA / US / USA