Affiliation:
1. National Industrial Internet of Things International S&T Cooperation Base, Chongqing University of Posts and Telecommunications, Chongqing, P.R. China
Abstract
With the advancement of IPv6 technology, many nodes in wireless sensor networks realize seamless connections with the Internet via IPv6 addresses. Security issues are a significant obstacle to the widespread adoption of IPv6 technology. Resource-constrained IPv6 nodes face dual attacks: local and Internet-based. Moreover, constructing an active cyber defense system for IPv6-based wireless sensor networks is difficult. In this article, we propose a K-nearest neighbor-based intrusion detection mechanism and design a secure network framework. This mechanism trains an intrusion detection algorithm using a feature data set to create a normal profile. The intrusion detection algorithm uses the normal profile to perform real-time detection of network traffic data to achieve rapid detections connecting many devices in a wireless sensor network. In addition, we develop a test platform to verify this mechanism. Experimental results show that this mechanism is appropriate for IPv6-based wireless sensor networks and achieves a low false-positive rate and good intrusion detection accuracy at an acceptable resource cost.
Subject
Computer Networks and Communications,General Engineering
Reference38 articles.
1. Chakrabarti S, Montenegro G, Droms R, et al. IPv6 over low-power wireless personal area network (6LoWPAN) ESC dispatch code points and guidelines. Internet requests for comments RFC editor RFC 8066, 2017, https://datatracker.ietf.org/doc/html/rfc8066
2. Thubert P, Nordmark E, Chakrabarti S, et al. Registration extensions for IPv6 over low-power wireless personal area network (6LoWPAN) neighbor discovery. Internet requests for comments RFC editor RFC 8505, 2018, https://datatracker.ietf.org/doc/rfc8505/
3. Bormann C, Shelby Z. Block-wise transfers in the constrained application protocol (CoAP). Internet requests for comments RFC editor RFC 7959, 2018, https://datatracker.ietf.org/doc/html/rfc7959
4. Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献