|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
Viadeo
|
English
|
Français
|
Español
|
العربية
|
 
International Journal of Innovation and Applied Studies
ISSN: 2028-9324     CODEN: IJIABO     OCLC Number: 828807274     ZDB-ID: 2703985-7
 
 
Monday 23 September 2019

About IJIAS

News

Submission

Downloads

Archives

Custom Search

Contact

Connect with IJIAS

  Now IJIAS is indexed in EBSCO, ResearchGate, ProQuest, Chemical Abstracts Service, Index Copernicus, IET Inspec Direct, Ulrichs Web, Google Scholar, CAS Abstracts, J-Gate, UDL Library, CiteSeerX, WorldCat, Scirus, Research Bible and getCited, etc.  
 
 
 

Monitoring behavior-based Intrusion Detection System for 6loWPAN networks


Volume 11, Issue 4, June 2015, Pages 894–907

 Monitoring behavior-based Intrusion Detection System for 6loWPAN networks

Anass RGHIOUI1, Anass KHANNOUS2, and Mohammed BOUHORMA3

1 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
2 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco
3 Laboratory of Informatics Systems and Telecomunication, Faculty of Science and Technology of Tangier, Abdelmalek Essaadi University, Morocco

Original language: English

Received 29 March 2015

Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


Even when 6LoWPAN has an ideal cryptography line defense, it is still necessary to implement an intrusion detection system (IDS) to deal with threats targeting network performance such as DoS attacks. IDS discover and stop most attacks that make changes on the operation of the network. However, few IDS solution has been proposed for 6LoWPAN networks. IDS missions are to monitor and raise an alarm about any possible threats and pass it to the system to restart the keying process for eliminating the attackers. New technique has been proposed recently based on the principle that neighbor nodes have a trend to have the same behavior, so the detection of the malicious node is based on the detection of the abnormal node that has a bad behavior different than it neighbors. The security goal is to provide a monitoring system that will attempt to detect anomalous malicious behavior and to prevent it from harming the network performance basing on the neighbors nodes behavior monitoring.

Author Keywords: 6LoWPAN, RPL, IDS, Neighbor-based IDS, Security.


How to Cite this Article


Anass RGHIOUI, Anass KHANNOUS, and Mohammed BOUHORMA, “Monitoring behavior-based Intrusion Detection System for 6loWPAN networks,” International Journal of Innovation and Applied Studies, vol. 11, no. 4, pp. 894–907, June 2015.