Skip to main content
Article
Collusion attacks mitigation in internet of things: a fog based model
Multimedia Tools and Applications
  • Qussai Yaseen, Jordan University of Science and Technology
  • Monther Aldwairi, Jordan University of Science and Technology
  • Yaser Jararweh, Jordan University of Science and Technology
  • Mahmoud Al-Ayyoub, Jordan University of Science and Technology
  • Brij Gupta, National Institute of Technology Kurukshetra
Document Type
Article
Publication Date
7-1-2018
Abstract

© 2017, Springer Science+Business Media, LLC. Collusion attacks are among the major security concerns nowadays due to the growth exposure in networks and communications. Internet of Things (IoT) environments are an attractive target for such type attacks. This paper discusses the problem of collusion attacks in IoT environments and how mobility of IoT devices increases the difficulty of detecting such types of attacks. It demonstrates how approaches used in detection collusion attacks in WSNs are not applicable in IoT environments. To this end, the paper introduces a model based on Fog Computing infrastructure to keep track of IoT devices and detect collusion attackers. The model uses fog computing layer for realtime monitoring and detection of collusion attacks in IoT environments. Moreover, the model uses a software defined systems layer to add a degree of flexibility for configuring Fog nodes to enable them to detect various types of collusion attacks. The paper provides algorithms, theorems, lemmas and mathematical proofs of the proposed model. Furthermore, the it highlights the possible overhead on fog nodes and network when applying the proposed model, and claims that fog layer infrastructure can provide the required resources for the scalability of the model. The experiments show how the proposed model can keep track of malicious nodes while moving from one cluster to other clusters in IoT environments in contrary to the models used in WSNs. Moreover, the experiments show that the proposed model can bear the computation overhead effectevilly, and reduces the power consumption of aggregator nodes in comparison to the models used in WSNs.

Publisher
Springer New York LLC
Keywords
  • Collusion attacks,
  • Fog computing,
  • Internet of things,
  • Security
Scopus ID
85031427179
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1007/s11042-017-5288-3
Citation Information
Qussai Yaseen, Monther Aldwairi, Yaser Jararweh, Mahmoud Al-Ayyoub, et al.. "Collusion attacks mitigation in internet of things: a fog based model" Multimedia Tools and Applications Vol. 77 Iss. 14 (2018) p. 18249 - 18268 ISSN: <a href="https://v2.sherpa.ac.uk/id/publication/issn/1380-7501" target="_blank">1380-7501</a>
Available at: http://works.bepress.com/monther-aldwairi/25/