Skip to main content
Log in

NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet of Things (IoTs) is a new concept in computer science that connects the objects with limited resources to unreliable internet through different technologies. The fundamental components of IoT (e.g., the wireless sensor networks and the internet) have an unsecured foundation that leads to different vulnerabilities such as vulnerability against a blackhole attack. In a blackhole attack, the attacker fakes itself as the shortest path to the destination, which is a node here. This causes the routing packets to not reach the destination. In this study, we offer a novel intelligent agent-based strategy using the hello packet table (NIASHPT) to deal with these problems by discovering the blackhole attacks. The proposed NIASHPT method provides an intrusion detection system scheme to defend against blackhole attacks and reduce or eliminate such attacks. This method consists of three phases: In the first phase, each node listens to its adjacent nodes and then applies a pre-routing process. In the stages of adjacent node listening and pre-routing, we attempt to find the blackhole attacks. In the second phase of the proposed method, the malicious nodes are detected and separated from the IoT network to avoid emerging attacks along the route from the source to the destination. In the third phase, the selected route from the source to the destination is checked. The method is evaluated here via extensive simulations carried out in the NS-3 environment. The experimental results of four scenarios demonstrated that the NIASHPT method can achieve a false positive rate of 19.453%, a false negative rate of 22.19%, a detection rate of 80.5%, a PDR of 89.56%, and a packet loss rate of 10.04% in the case of launching a blackhole attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Bhalaji N, Hariharasudan KS, Aashika K (2019) A trust based mechanism to combat blackhole attack in RPL protocol. In: International Conference on Intelligent Computing and Communication Technologies. Springer, Singapore, pp 457–464

  2. Hammamouche A, Omar M, Djebari N, Tari A (2018) Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J Inf Secur Appl 43:12–20

    Google Scholar 

  3. Behzad S, Fotohi R, Dadgar F (2015) Defense against the attacks of the black hole, gray hole and wormhole in MANETs based on RTT and PFT. Int J Comput Sci Netw Solut IJCSNS 3:89–103

    Google Scholar 

  4. Fotohi R (2019) Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system. Reliab Eng Syst Saf 193:106675

    Article  Google Scholar 

  5. Bostani H, Sheikhan M (2017) Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach. Comput Commun 98:52–71

    Article  Google Scholar 

  6. Sahay R, Geethakumari G, Mitra B, Thejas V (2018) Exponential smoothing based approach for detection of blackhole attacks in IoT. In: 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS). IEEE, pp 1–6

  7. Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: secure routing for IoT and CPS. IEEE Internet Things J 4(6):2129–2141

    Article  Google Scholar 

  8. Airehrour D, Gutierrez JA, Ray SK (2017) A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks. J Telecommun Digital Econ 5(1):50–69. https://doi.org/10.18080/jtde.v5n1.88

    Google Scholar 

  9. Raoof A, Matrawy A, Lung CH (2018) Routing attacks and mitigation methods for RPL-based internet of things. IEEE Commun Surv Tutor 21(2):1582–1606

    Article  Google Scholar 

  10. Patel HB, Jinwala DC (2019) Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON). IEEE, pp 947–954

  11. Conti M, Kaliyar P, Rabbani MM, Ranise S (2018) SPLIT: a secure and scalable RPL routing protocol for Internet of Things. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp 1–8

  12. Sicari S, Rizzardi A, Miorandi D, Coen-Porisini A (2018) REATO: REActing TO Denial of Service attacks in the Internet of Things. Comput Netw 137:37–48

    Article  Google Scholar 

  13. Yavuz FY, Ünal D, Gül E (2018) Deep learning for detection of routing attacks in the internet of things. Int J Comput Intell Syst 12(1):39–58

    Article  Google Scholar 

  14. Qin T, Wang B, Chen R, Qin Z, Wang L (2019) IMLADS: intelligent maintenance and lightweight anomaly detection system for internet of things. Sensors 19(4):958

    Article  Google Scholar 

  15. Jamali S, Fotohi R (2017) DAWA: defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J Supercomput 73(12):5173–5196

    Article  Google Scholar 

  16. Fotohi R, Firoozi Bari S, Yusefi M (2019) Securing wireless sensor networks against denial-of-sleep attacks using RSA cryptography algorithm and interlock protocol. Int J Commun Syst. https://doi.org/10.1002/dac.4234

    Article  Google Scholar 

  17. Sarkohaki F, Fotohi R, Ashrafian V (2017) An efficient routing protocol in mobile ad-hoc networks by using artificial immune system. Int J Adv Comput Sci Appl IJACSA 8(4):554–561

    Google Scholar 

  18. Alcaraz C (2019) Security and privacy trends in the industrial internet of things. Springer, New York

    Book  Google Scholar 

  19. Fotohi R, Ebazadeh Y, Geshlag MS (2016) A new approach for improvement security against DoS attacks in vehicular ad-hoc network. Int J Adv Comput Sci Appl 7(7):10–16

    Google Scholar 

  20. Rathee G, Sharma A, Kumar R, Iqbal R (2019) A secure communicating things network framework for industrial IoT using blockchain technology. Ad Hoc Netw 94:101933

    Article  Google Scholar 

  21. Behzad S, Fotohi R, Balov JH, Rabipour MJ (2018) An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks. JCP 13(6):705–720

    Article  Google Scholar 

  22. Zhang J, Rajendran S, Sun Z, Woods R, Hanzo L (2019) Physical layer security for the internet of things: authentication and key generation. IEEE Wirel Commun 26:92–98

    Article  Google Scholar 

  23. Fotohi R, Jamali S (2014) A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks. Int J Comput Sci Netw Solut 2:37–56

    Google Scholar 

  24. Butun I, Österberg P, Song H (2019) Security of the internet of things: vulnerabilities, attacks and countermeasures. IEEE Commun Surv Tutor. https://doi.org/10.1109/COMST.2019.2953364

    Article  Google Scholar 

  25. Zandiyan S, Fotohi R, Koravand M (2016) P-method: improving AODV routing protocol for against network layer attacks in mobile Ad-Hoc networks. Int J Comput Sci Inf Secur 14(6):95

    Google Scholar 

  26. Fotohi R, Heydari R, Jamali S (2016) A hybrid routing method for mobile ad-hoc networks. J Adv Comput Res 7(3):93–103

    Google Scholar 

  27. Xia J, Xu Y, Deng D, Zhou Q, Fan L (2019) Intelligent secure communication for Internet of Things with statistical channel state information of attacker. IEEE Access 7:144481–144488

    Article  Google Scholar 

  28. Fotohi R, Jamali S, Sarkohaki F, Behzad S (2013) An Improvement over AODV routing protocol by limiting visited hop count. Int J Inf Technol Comput Sci IJITCS 5(9):87–93

    Google Scholar 

  29. Jamali S, Fotohi R (2016) Defending against wormhole attack in MANET using an artificial immune system. New Rev Inf Netw 21(2):79–100

    Article  Google Scholar 

  30. Zhang T, Zhang T, Ji X, Xu W (2019) Cuckoo-RPL: cuckoo filter based RPL for defending AMI network from blackhole attacks. In: 2019 Chinese Control Conference (CCC). IEEE, pp 8920–8925

  31. Behzad S, Fotohi R, Jamali S (2013) Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops. Int J Inf Technol Comput Sci IJITCS 5(6):2013

    Google Scholar 

  32. Kandhoul N, Dhurandher SK, Woungang I (2019) T_CAFE: a trust based security approach for opportunistic IoT. IET Commun 13(20):3463–3471. https://doi.org/10.1049/iet-com.2019.0657

    Article  Google Scholar 

  33. Jamali S, Fotohi R, Analoui M (2018) An artificial immune system based method for defense against wormhole attack in mobile adhoc networks. Tabriz J Electr Eng 47(4):1407–1419

    Google Scholar 

  34. Sani AS, Yuan D, Jin J, Gao L, Yu S, Dong ZY (2019) Cyber security framework for Internet of Things-based Energy Internet. Future Gener Comput Syst 93:849–859

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reza Fotohi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Seyedi, B., Fotohi, R. NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things. J Supercomput 76, 6917–6940 (2020). https://doi.org/10.1007/s11227-019-03143-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-03143-7

Keywords

Navigation