You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

Published: 29 February 2020

Reputation Management Using Honeypots for Intrusion Detection in the Internet of Things

and
1
School of Electrical Engineering, Minhaj University, Lahore 54770, Pakistan
2
Department of Computer Science, Grande Prairie Regional College, Grand Priaire, AB T8V 4C4, Canada
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Security, Privacy and Trustworthiness of Wireless Communications and Networks

Abstract

Internet of Things (IoT) networks consist of tiny devices with limited processing resources and restricted energy budget. These devices are connected to the world-wide web (www) using networking protocols. Considering their resource limitations, they are vulnerable to security attacks by numerous entities on the Internet. The classical security solutions cannot be directly implemented on top of these devices for this reason. However, an Intrusion Detection System (IDS) is a classical way to protect these devices by using low-cost solutions. IDS monitors the network by introducing various metrics, and potential intruders are identified, which are quarantined by the firewall. One such metric is reputation management, which monitors the behavior of the IoT networks. However, this technique may still result in detection error that can be optimized by combining this solution with honeypots. Therefore, our aim is to add some honeypots in the network by distributing them homogeneously as well as randomly. These honeypots will team up with possible maliciously behaving nodes and will monitor their behavior. As per the simulation results, this technique reduces the error rate within the existing IDS for the IoT; however, it costs some extra energy. This trade-off between energy consumption and detection accuracy is studied by considering standard routing and MAC protocol for the IoT network.

1. Introduction

It is foreseen that several billions of tiny devices will be linked to the Internet soon ([]). These devices have limited processing resources and restricted energy budget, but they may positively change the way we live right now. Owing to limited resources, they are a possible target of malicious intruders. These intruders cause network traffic disruption leading to a non-functional network. Hence, it is a prime requirement to secure these devices without losing a lot of resources while implementing an application []. One such attack is a Denial-of-Service attack, where the attacker causes disruption in network traffic by either dropping the packets or by selectively forwarding the packets [].
To implement a low-cost solution, we consider a class of applications based on reputation management [].With this type of solution, a reputation is built for all the participating IoT nodes by considering their past interactions with their neighbors. If a node is involved in dropping or selectively forwarding the packets, then it is labeled to be malicious by its neighbors and its reputation starts to fall below a certain threshold. If reputation decreases severely, then it is removed from the network by a firewall. However, this may lead to trust-based attacks where malicious nodes can give wrong reputation values for a good node and this may decrease detection percentage []. Therefore, in case of trust-based attack, the central authority tasks some nodes to see if there is a trust-based attack going on in the network. These devices act like honeypots and their behavior may help in decreasing the errors in reputation-based solutions. Here it is pertinent to mention that as per [], a honeypot is defined as: “It is a system that captures and identifies malicious activities by simulating a real system or protocol.” These honeypots reduce the detection error in the reputation-based solution. However, these honeypots may consume resources in terms of energy consumption and processing time. Therefore, it is required to analyze various parameters so that optimal resources are allocated for minimizing the detection error.
Our target is to consider a tree, which is formed by the Routing Protocol for Low power and Lossy networks (RPL) []. The nodes are attached to this tree, and the traffic is forwarded to the central node, which is called a border router. If a node is dropping packets, as described previously, then its reputation starts to fall. The border router constantly monitors the network and some honeypots are installed in the network to monitor the malicious nodes. These will facilitate in tracking down the maliciously behaving nodes.
In this article, we first explain the related work in the Section 2, which comprises of a discussion on the RPL routing protocol, the IEEE 802.15.4 protocol, the possible threats/solutions against IoT networks, and the honeypots for the IoT networks. Later, we propose a honeypot-based reputation management for the IoT network in Section 3. Section 4 explains the battery lifetime estimation process for the CC2480 device employing the IEEE 802.15.4 protocol. Finally, we explain the results obtained from the simulations in the Section 5 and the article is concluded in the Section 6. The nomenclature and abbreviations used in paper are given in Nomenclature and Abbreviations in the final part of the paper respectively.

3. Honeypot-Based Reputation development for Intrusion Detection in the IoT

An unauthorized activity initiated in a network by an attacker can be achieved in either active or passive manner and it is termed as an intrusion. Passive attacks take out important information from the network without damaging it. On the contrary, active attacks harm the network communication by dropping and tempering the data packet []. The IoT network has limited system resources in terms of processing power, battery capacity and communication bandwidth, hence, it will lose severely in the case of an intrusion. There is another need to design a system that can protect the IoT network without losing a lot of precious resources. Reputation Management is a way to protect the IoT system without using a lot of these resources. If combined with the honeypots, then it can further enhance the performance of the system. In this section, we first describe a reputation management system for the RPL-based IoT network. Then, we shall introduce honeypots in several ways to inquire about their performance.

3.1. Reputation Management for the RPL protocol

In this section, we shall describe the approach for trust development in the RPL protocol. The approach is inspired by [] and it considers the cyber-attacks on RPL described in Section 2.2.We make the following assumptions:
  • The nodes support idle mode listening for neighboring traffic.
  • The malicious nodes are involved in routing attacks described previously.
To explain the model, we assume nodes a, b and c are involved in a communication as indicated in Figure 3. As a node a wants to forward a packet to node c, through node node b. If node b is involved in a routing attack, it will not send the packet to node c; however, due to the nature of wireless medium, the node a will realize the attack. It will, therefore, reduce its trust on node b. On the other hand, if the packet is forwarded correctly, then node a will have more trust on node b and its trust will eventually increase. An example of monitoring algorithm is explained in Algorithm 1.
Algorithm 1 Security Monitoring
 while p a c k e t _ r e c e i v e d do
if ( N e x t _ H o p _ A d d r e s s M y _ A d d r e s s ) then
  if ( N e x t _ H o p B o r d e r _ R o u t e r ) then
   if Packet is forwarded towards next hop then
     I n c r e m e n t _ S u c c e s s f u l _ I n t e r a c t i o n _ C o u n t e r
   else
     I n c r e m e n t _ F a i l e d _ I n t e r a c t i o n _ C o u n t e r
   end if
  end if
end if
 end while
Figure 3. Radio Transmission Range of node b.
That is how; each node calculates three metrics, i.e., belief, b, disbelief, d and uncertainty, u for a certain node using the model described in []. The belief of node i on node j ( b i , j ) increases after a successful interaction with a particular node, while disbelief of node i on node j ( d i , j ) increases in the case of unsuccessful interaction. If an interaction did not happen between the nodes, then the uncertainty of node i on node j ( u i , j ) would increase. The formulas of these three factors are given below:
b i , j = p i , j ( p i , j + n i , j + 1 ) d i , j = n i , j ( p i , j + n i , j + 1 ) u i , j = 1 ( p i , j + n i , j + 1 )
Here, successful and failed interactions between nodes i and j is described by p i , j and n i , j , respectively. However, uncertainty is described by u i , j . For example, if a node i forwards the traffic of node j to the next hop then it is counted as a successful interaction. On the other hand, if node i deliberately drops the traffic of node j then it is involved in an attack and it is counted as a failed interaction. Finally, if node i cannot judge whether a packet is forwarded by j, then this increases the uncertainty about that iteration. These values are passed to the border router, which calculates the overall recommendations of the nodes. The consensus operator described in [], which is commutative and associative, is used to combine these values and is given below:
w r 1 x w r 2 x b r 1 x u r 2 x + b r 2 x u r 1 x k , d r 1 x u r 2 x + d r 2 x u r 1 x k , u r 1 x u r 2 x k
It is based on recommendations by two different nodes, r 1 and r 2 . The values w r 1 x = ( b r 1 x , d r 1 x , u r 1 x ) and w r 2 x = ( b r 2 x , d r 2 x , u r 2 x ) describes the recommendation; however, while k is equal to u r 1 x + u r 2 x u r 1 x u r 2 x .

3.2. Insertion of Honeypots for Reputation Management in RPL

There are some classical solutions, which inject some malicious packets into the network. This includes honeypots of different size, which can deceive malicious devices to quarantine them from the network. The functions of honeypot are as follows:
  • Monitor Nodes involved in malicious activity.
  • Gain the trust of bad nodes by decreasing reputation of good nodes, and increasing the reputation of bad nodes.
In this article, we consider two placement strategies of the honeypots for evaluating the proposed approach. These are described below:

3.2.1. Random Honeypots placement for the RPL

In the first method, the honeypots are randomly placed in the network. The network is analyzed to see the behavior of such a placement. The algorithm for placing random honeypots is described in Algorithm 2. To implement this method, the border router calculates the reputation of each node in the network. If the reputation of a node falls below a certain level, some randomly selected trusted nodes are activated as honeypots by the border router. These trusted nodes have a very high reputation and confidence value. The honeypots are informed via control packets using the routing tree of the RPL protocol. These nodes will monitor the network traffic to see whether a node is actually malicious or not. The accuracy of these honeypots depends on their listening range, which can be increased by enhancing the transmission range of the network. The network will be analyzed for battery life and detection accuracy of the reputation solution using honeypots.
Algorithm 2 Reputation Management in RPL for Randomly placed Honeypots
 if Periodic Trust packets are received from member nodes then
 Combine trust values for every member node to compute its reputation
if the Reputation of a certain node falls below a threshold then
  Activate randomly placed Honeypots in the network
end if
 end if

3.2.2. Homogeneous Honeypots placement for the RPL

In this method, the honeypots are placed at specified homogeneous locations in the network. They are basically evenly distributed in the network. The network is analyzed to see the behavior of such a placement. The algorithm for homogeneous placement of honeypots is described in Algorithm 3. Once the reputation of a node falls below a certain threshold, these honeypots are activated by the border router, using specific control packets. The network is monitored by these honeypots to monitor trust-based attacks. The technique is analyzed for detection accuracy and battery lifetime later.
Algorithm 3 Reputation Management in RPL for Homogeneously placed Honeypots
 if Periodic Trust packets are received from member nodes then
 Combine trust values for every member node to accumulate its reputation
if the Reputation of a certain node falls below a threshold then
  Activate homogeneously placed Honeypots in the network
end if
 end if
Two strategies are adopted from [] for trust and reputation management. The first one is called neighbor-based trust dissemination (NTD) and the second one is cluster-based trust dissemination (CTD). In NTD, trust management is dependent on monitoring the behavior of neighbors. However, CTD considers clusters for trust management in the network. When NTD is combined with the honeypots, then this solution is called Honeypot-based NTD (HNTD). Similarly, honeypot-based solution for CTD is termed as HCTD. In the following, the NTD, CNTD, CTD and HCTD are analyzed for the efficiency of honeypots for trust management. Furthermore, the effect of honeypot placement on energy efficiency is also discussed.

4. Battery Lifetime Estimation for the IEEE 802.15.4

We describe the estimation of battery lifetime for CC2480-based IoT devices. The medium access control for CC2480 employs the IEEE 802.15.4 protocol. It is inspired by [] and [] and it considers three cases for energy estimation, i.e., best, worst and average case. The process is explained below:

4.1. Best Case

For considering the best case, it is assumed that channel is available as soon as a packet needs to be transmitted. The mote transmits a frame when an idle channel is detected. To transmit a frame with a data payload of n bytes, it is assumed that time t x m i t ( n ) is needed. This time is calculated as follows:
t x m i t ( n ) = 8 ( O H M A C + n ) r
In this equation, r is the rate of data transmission for IEEE 802.15.4, with value of 250 kbps in ISM 2.4 GHz band. O H M A C denotes the total overhead and it includes frame delimiter, MAC header, CRC field and preamble for an IEEE802.15.4 frame, with a value of 31 bytes.
The amount of current required by the CC2480 device to transmit n bytes is given by following equation:
I a c t ( n ) = t o n _ o f f I o n _ o f f + t l i s t e n I l i s t e n + t x m i t ( n ) I x m i t t a c t ( n )
where t o n _ o f f with a value of 13 ms, means the time required by the CC2480 transceiver for waking up and turning off. The current required for this activity is represented by I o n _ o f f and its value is 13 mA. The current required by the transceiver during transmission of n bytes is indicated by I x m i t , with value of 30.5 mA. t a c t ( n ) indicates the time of the activity period and is given by following equation:
t a c t ( n ) = t o n _ o f f + t l i s t e n + t x m i t ( n )
The mean drain current of the battery is given by:
I d r a i n ( n ) = t a c t ( n ) T I a c t ( n ) + [ 1 t a c t ( n ) T ] I s l e e p
where T represents the time between two successive transmissions of data (also called update period), and I s l e e p represents the sleep mode current. In addition, the term t a c t ( n ) T represents the duty cycle of the device. The battery lifetime L (in hours) with capacity C (in mAh) can be obtained using following equation []:
L = C I d r a i n ( n )
Here, the current required in the startup phase is neglected and we assume only upstream traffic. The typical capacity of 1200 mAh, which is provided by two AA batteries is considered.

4.2. Average Case

To estimate the battery lifetime for an average case, the main parts to be considered are the frequency of collisions and the failures in channel access. If we assume that these factors are self-uncorrelated and independent stochastic processes, then we can use the equations described previously for best case to calculate average case transmission and listening periods. If packet collision probability is represented by p c and the probability that the channel is occupied in the course of the Clear Channel Assessment (CCA) operation, then the average time required by the CC2480 transceiver for transmitting a packet is computed as follows:
t l i s t e n = i = 0 a M a x F p c i ( 1 p C S M A _ f a i l ) i [ p C S M A _ f a i l t C S M A _ f a i l + ( 1 p C S M A _ f a i l ) ( t C S M A n o t f a i l + t T A + t A C K ) ]
In this equation, the probability a channel access failure is denoted by p C S M A _ f a i l and maximum number of times the CSMA algorithm is invoked after the first CCA failure is represented by m M a x b . It is pertinent to note that the p C S M A _ f a i l is calculated after mMaxb+1 CSMA waits and mMaxb+1 failed CCA operations. Thus, p C S M A _ f a i l is estimated as:
p C S M A _ f a i l = p 0 m M a x b + 1
Here mean transmission time that ended up in a channel access failure is denoted by t C S M A _ f a i l and it is calculated after m M a x b + 1 CCA failures and m M a x b + 1 CSMA waits.
t C S M A _ f a i l = i = 0 m M a x b [ 0.5 t b a c k o f f ( 2 m i n ( m a c M i n B E + i , m a c M a x B E ) 1 ) + t C C A ]
By default, the terms m a c M i n B E and m a c M a x B E are assigned the values of 3 and 5, respectively []. These terms represent the initial and maximum values of B E , the backoff exponent, respectively. The value of t C S M A _ f a i l is estimated to be 19.04 ms, by using the default values of mMaxb, macMinBE and macMaxBE. The mean expected delay for the CSMA/CA algorithm and CCA operations of a transmission endeavor, which does not result in channel access failure is represented by t C S M A n o t f a i l . This can be computed as follows:
t C S M A n o t f a i l = 1 p 0 1 p 0 m M a x b + 1 i = 0 m M a x b p 0 i [ j = 0 i ( 0.5 t b a c k o f f ( 2 m i n ( m a c M i n B E + j , m a c M a x B E ) 1 ) + t C C A ) ]
For n data bytes, the mean time for CC2480 transceiver in transmission state is calculated as follows:
t x m i t ( n ) = 8 ( O H M A C + n ) r i = 0 a M a x F ( 1 p C S M A _ f a i l ) i + 1 p c i
The mean number of time a packet is transmitted is given by summation i = 0 a M a x F ( 1 p C S M A _ f a i l ) i + 1 p c i . As per [], the values of p 0 and p c are taken as 0.25.

4.3. Worst Case

If the successful transmission of a frame is done in the last transmission attempt, then it is considered to be the worst case. The worst-case listening time of the CC2480 radio transceiver is computed as follows:
t l i s t e n = ( a M a x F + 1 ) ( t C S M A ( m a x i m u m ) + t T A + t A C K )
The maximum number of times a transmission is attempted is expressed as a M a x F . As per IEEE 802.15.4 standard, m a c M a x F r a m e R e t r i e s is set to a value of 3. If a transceiver switches from the transmission to reception (or vice versa), then the corresponding time is called turnaround time and is represented by t T A , with value of 0.192 msec. If the receiver waits for the ACK packet before re-sending the packet, then corresponding time is represented by t A C K , with value of 0.864 msec. The term t C S M A ( m a x i m u m ) represents maximum delay in each transmission attempt, which may be introduced by the CSMA/CA algorithm and CCA operation, and it is calculated as follows:
t C S M A ( m a x i m u m ) = i = 0 m M a x b ( ( 2 m i n ( m a c M i n B E + i , m a c M a x B E ) 1 ) t b a c k o f f + t C C A )
The default value of m a c M a x C S M A b a c k o f f s is 4 as per the standard. t C C A denotes time required by the CCA operation, with a value of 0.128 ms. However, the backoff period is denoted by t b a c k o f f and its value is 0.32 s. Using these values, t l i s t e n and t C S M A ( m a x i m u m ) are calculated as 153.98 ms and 37.44 ms, respectively. The maximum time that the CC2480 transceiver remains in successful transmission mode (by considering a M a x F retransmissions) is calculated as:
t x m i t ( n ) = ( a M a x F + 1 ) ( 8 ( O H M A C + n ) r )
The battery lifetime can be estimated using these equations.

5. Simulation Results

The OCTAVE [] is used to analyze the three approaches described before and the simulation parameters are described in Table 1. OCTAVE is a mathematical and scientific software tool, with powerful plotting and visualization features. It is free software that executes on operating systems like GNU/Linux, macOS, BSD, and Windows. As the OCTAVE is mostly compatible with MATLAB [], therefore, simulation model used in this article is inspired by MATLAB simulations described in [,,].
Table 1. Simulation Parameters.
In this section, we compare the HNTD and HCTD with the representative related work. The two strategies for comparison are adopted from [] and they are termed as NTD and CTD. In the following, the NTD, CNTD, CTD and HCTD are compared for intruder detection accuracy. In addition, the effect of honeypot placement on energy efficiency is also described.
The simulation scenario consists of 1000 nodes, which are randomly placed in a 100 m × 100 m network. The simulation parameters are inspired by other articles where other IoT protocols are investigated [,]. We vary the number of intruder nodes, and the simulation results are presented next. The detection results as well as energy consumption analysis is explained in following sections:

5.1. Analysis of Honeypot-Based Reputation Management

The results of honeypot-based reputation management are presented in this section, using the simulation parameters are described previously. Following five parameters have been employed to access the algorithms:
Number of Intruders Detected: This parameter determines the number of intruder nodes that have been identified.
False Positives: This parameter indicates number of non-intruder nodes that have been identified as intruder.
False Negatives: This parameter accounts for number of intruder nodes that have been identified as non-intruder.
Undetected Positives: This parameter indicates number of intruder nodes that could not be identified as either an intruder or a non-intruder due to lack of trust values.
Undetected Negatives: This parameter determines number of non-intruder nodes that could not be identified as either an intruder or a non-intruder due to lack of trust values.
We consider two cases for simulation, i.e., homogeneously and randomly placed honeypots. The results are described below:

5.1.1. Homogeneously Placed Honeypots

In this section, we consider the case of nine homogeneously placed honeypots as described in Algorithm 3. Figure 4 and Figure 5 plots number of false negatives and false positives, respectively, by varying intruder nodes in the network. The false positives are obtained by changing the listening range from 10 m to 25 m. Generally, the CTD and HCTD has lower performance than NTD and HNTD. This is because they have lesser monitoring to do. However, on increasing the listening range to 25 m, the number of false negatives decreases to zero. This is because the homogeneously placed honeypots have access to the transmission range of all the malicious nodes and they can verify their behavior. If a malicious node is actually a good node, but its reputation is fallen below a certain threshold due to trust-based attacks, then it can be updated by the honeypot to the border router. Similarly, if a bad node gets a good reputation, then it can also be monitored by the honeypot once its listening range is up to 25 m. This will eventually decrease the false positives and false negatives in the network.
Figure 4. Number of False Negatives for Homogeneously placed Honeypots.
Figure 5. Number of False Positives for Homogeneously placed Honeypots.
The listening range does not have a significant effect on the detection of intruder nodes by the four techniques. This is explained in Figure 6. However, for most of the cases, detection rates of NTD and HNTD are better than CTD and HCTD.
Figure 6. Number of Intruder Nodes Detected for Homogeneously placed Honeypots.
Finally, the number of undetected negatives and undetected positives are plotted in Figure 7 and Figure 8, respectively. As the listening range is increased, we see a significant correction in these results when the listening range is 25 m or above. Thus, for the given configuration, 25 m are a better listening range for honeypots to have better results, because the honeypots can detect most of the nodes. This helps the honeypot to correct the error in detection. Moreover, it is also concluded that the CTD and HCTD has lower performance than NTD and HNTD. As the NTD and HNTD monitors all the traffic that is being forwarded by the neighboring nodes.
Figure 7. Number of Undetected Negatives for Homogeneously placed Honeypots.
Figure 8. Number of Undetected Positives for Homogeneously placed Honeypots.

5.1.2. Randomly Placed Honeypots

In this section, we deploy nine honeypots randomly in the network as described in Algorithm 2 and explain the simulation results. Figure 9 and Figure 10 plot number of false negatives and false positives, respectively, by varying intruder nodes in the network. The false positives are obtained by changing the listening range from 10 m to 25 m. Generally, the NTD and HNTD have better performance than CTD and HCTD. This is because they have lesser monitoring to do. However, if the listening range is increased to 25 m, the number of false negatives decreases to zero. As the honeypot is now able to monitor the nodes up to 25 m, therefore, it can detect more errors. These errors are caused by trust-based attacks and it results in bad nodes looking good and vice versa. As a result of honeypot deployment, these errors are reduced, leading to a better solution for reputation management in the IoT network.
Figure 9. Number of False Negatives for Randomly placed Honeypots.
Figure 10. Number of False Positives for Randomly placed Honeypots.
The listening range does not have a significant effect on the detection of intruder nodes by the four techniques. This is explained in Figure 11. However, for most of the cases, the detection rate of NTD and HNTD is better than the CTD and HCTD.
Figure 11. Number of Intruder Nodes Detected for Randomly placed Honeypots.
Finally, the number of undetected negatives and undetected positives are plotted in Figure 12 and Figure 13. As the listening range is increased, we see a significant correction in these results when the listening range is 25 m or above. Thus, for the given configuration, 25 m are a better listening range for honeypots to have effective results. Again, increasing the listening range of honeypot enables it to detect the trust-based attacks in the network, which yields better results for undetected negatives and undetected positives. Lastly, the CTD and HCTD has lower performance than NTD and HNTD because of less monitoring overhead.
Figure 12. Number of Undetected Negatives for Randomly placed Honeypots.
Figure 13. Number of Undetected Positives for Randomly placed Honeypots.

5.2. Energy Consumption Analysis

To increase listening range, we must tune the transmission power of every node. In this example, we show that by increasing the transmission power of the nodes has a positive effect on the trust-based results. The change in transmission current is predicted using the following equation of free-space model []:
E T X ( d ) = E E l e c + ϵ f s d 2 ( d < 87 m )
That is, the transmission range varies as per this equation if a free-space model is used. If we choose a particular IoT device for an application, then its transmission range is configured as per its characteristics. However, in this article we select the generalized free-space model to estimate transmission current and this estimation technique would be valid for any type of IoT device. The Figure 14, Figure 15 and Figure 16 show the estimated battery lifetime for best case, average case and worst case, respectively.
Figure 14. Estimated Battery Lifetime—Best Case.
Figure 15. Estimated Battery Lifetime—Average Case.
Figure 16. Estimated Battery Lifetime—Worst Case.
Similarly, Figure 17, Figure 18 and Figure 19 explain the estimated drain current for best case, average case and worst case. Increasing the transmission range from 10 m to 25 m decreases the battery lifetime and increases the drain current. As transmission range is increased by augmenting the transmission power of the IoT devices. However, this decrease in battery lifetime and increase in transmission range has a positive effect on honeypot-based trust management. This cost needs to be considered for deploying the honeypots in the network. Furthermore, for all the results presented, increasing the packet size has a negative impact on drain current and battery lifetime. As transmitting a larger packet consumes more energy, which leads to increase in drain current and reduction in battery lifetime.
Figure 17. Required Current for the device—Best Case.
Figure 18. Required Current for the device - Average Case.
Figure 19. Required Current for the device - Worst Case.

6. Conclusions

In this article, we used honeypots for reputation management in IoT network. In our previous work, we concluded that reputation management has less overhead for securing IoT network, but there are detection errors. However, these results can be further optimized by using honeypots for reputation management. We showed that adding honeypots will be better if a proper transmission range for transmission/reception is selected. However, increasing transmission range consumes significant amount of energy, which needs to be considered. Thus, there is a trade-off between reducing the detection error and battery lifetime. If a proper detection range is not selected, then the devices are going to consume more energy than required. Hence, it is necessary to consider a better transmission range of devices once honeypots are deployed. This range can be selected for a particular type of node based on the techniques, which are presented in this article. Furthermore, it is also concluded that the cluster-based techniques for monitoring the network traffic has less overhead. However, it results in lower detection accuracy and higher error rate. Finally, it is deducted that another way to optimize the results is by increasing the number of honeypots in the network, but it is a costly solution.
The presented solution is significantly different from the honeypot-based solutions that are described in the related work. Most of those solutions discuss the implementation of honeypots for detecting new types of cyber-attacks on IoT systems. Either they change the number of honeypots, or use machine learning tools to capture new attack patterns. On the other hand, some solutions confuse the attacker by changing the behavior of honeypot as either a good or a bad node. Sometimes, they also use game theory for analyzing the honeypot vs. attacker scenario. To the best of our knowledge, we did not find an article where the honeypot-based solution is combined with the reputation management for securing IoT network. Therefore, our solution is significantly different from the available honeypot techniques for the IoT networks. As per the results presented in the article, the proposed solution gives acceptable results for minimizing errors for the intruder detection. However, this comes at a cost of increased energy consumption. Consequently, we can consider IoT devices, which have more energy and processing resources for taking the role of honeypots.
In the perspective work, we aim to evaluate the results by increasing the number of honeypots. Furthermore, we also suggest implementing the proposed techniques on real-world platforms (e.g., [,]) for verification of the presented results.

Author Contributions

Conceptualization, Z.A.K. and U.A.; methodology, Z.A.K.; writing—original draft preparation, Z.A.K.; writing—review and editing, Z.A.K. and U.A.; funding acquisition, U.A. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by GPRC, Department of Science. The APC was funded by GPRC Professional Development Fund.

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

The following nomenclature is used in this manuscript:
b i , j Belief of node i on node j
d i , j Disbelief of node i on node j
u i , j Uncertainty of node i on node j
p i , j Successful interactions between nodes i and j
n i , j Unsuccessful interactions between nodes i and j
w r 1 x Recommendation of node r 1 about node x
w r 2 x Recommendation of node r 2 about node x
t x m i t ( n ) Time required to transmit a frame with a data payload of n bytes
rData transmission rate for IEEE 802.15.4
O H M A C Total MAC overhead
t o n _ o f f Time required by the transceiver for waking up and turning off
I o n _ o f f Current required by the transceiver for waking up and turning off
t l i s t e n Time required by the transceiver for listening to the channel
I l i s t e n Current required by the transceiver for listening to the channel
t x m i t ( n ) Time required by the transceiver during transmission of n bytes
I x m i t Current required by the transceiver during transmission
t a c t ( n ) Time of the activity period
I d r a i n ( n ) Mean drain current of the battery
I s l e e p Sleep mode current
LBattery lifetime
CBattery capacity
TUpdate period
aMaxFMaximum number of times a transmission is attempted
p c Packet collision probability
p C S M A _ f a i l Probability for a channel access failure
t C S M A _ f a i l Mean transmission time that ended up in a channel access failure
t C S M A n o t f a i l Mean expected delay for the CSMA/CA algorithm and CCA operations, which does not result in channel access failure
t T A Turnaround time
t A C K Receiver waiting time for the ACK packet before re-sending the packet
m M a x b Maximum number of times the CSMA algorithm is invoked after the first CCA failure
t b a c k o f f Backoff period
t C C A Time required by the CCA operation
t C S M A ( m a x i m u m ) Maximum delay in each transmission attempt
macMinBEMinimum backoff exponent
macMaxBEMaximum backoff exponent

Abbreviations

The following abbreviations are used in this manuscript:
BIBeacon intervals
CAPContention Access Period
CCAClear Channel Assessment
CFPContention Free Period
CSMA/CACarrier Sense Multiple Access with Collision Avoidance
CTDCluster-based trust dissemination
DAODestination Advertisement Object
DDoSDistributed Denial of Service
DIODODAG Information Object
DISDODAG Information Solicitation
DODAGDestination Oriented Directed Acyclic Graph
DoSDenial of Service
FFDFull-Function Devices
GTSGuaranteed Time Slots
HCTDHoneypot-based CTD
HNTDHoneypot-based NTD
IDSIntrusion Detection System
IEEEInstitute of Electrical and Electronics Engineers
IoTInternet of Things
MACMedium Access Control
MDPUMAC Protocol Data Units
NTDNeighbor-based trust dissemination
PANPersonal Area Networks
RFCRequest for comment
RFDReduced-Function Devices
RPLRouting Protocol for Low power and Lossy networks
UPnPUniversal Plug and Play
wwwworld-wide web

References

  1. Velosa, A.; Hines, J.F.; LeHong, H.; Perkins, E.; Satish, R.M. Predicts 2015: The Internet of Things. Available online: https://www.gartner.com/doc/2952822/predicts--internet-things (accessed on 26 February 2020).
  2. Jing, Q.; Vasilakos, A.V.; Wan, J.; Lu, J.; Qiu, D. Security of the internet of things: Perspectives and challenges. Wirel. Netw. 2014, 20, 2481–2501. [Google Scholar] [CrossRef]
  3. Raza, S.; Shafagh, H.; Hewage, K.; Hummen, R.; Voigt, T. Lithe: Lightweight secure CoAP for the internet of things. IEEE Sens. J. 2013, 13, 3711–3720. [Google Scholar] [CrossRef]
  4. Khan, Z.A.; Herrmann, P. A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things. In Proceedings of the 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), Taipei, Taiwan, 27–29 March 2017; pp. 1169–1176. [Google Scholar]
  5. Khan, Z.A.; Ullrich, J.; Voyiatzis, A.G.; Herrmann, P. A Trust-based Resilient Routing Mechanism for the Internet of Things. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August 2017–1 September 2017; pp. 27:1–27:6. [Google Scholar]
  6. Wang, M.; Santillan, J.; Kuipers, F. ThingPot: An interactive Internet-of-Things honeypot. arXiv 2018, arXiv:1807.04114. [Google Scholar]
  7. IETF. RfC 6550—RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Available online: https://tools.ietf.org/html/rfc6550 (accessed on 26 February 2020).
  8. IETF. Neighbor discovery for IP version 6 (IPv6), IETF RFC 4861. Available online: https://tools.ietf.org/html/rfc4861 (accessed on 26 February 2020).
  9. Mohamed, B.; Mohamed, F. QoS routing RPL for Low power and Lossy Networks. Int. J. Distrib. Sens. Netw. 2015, 2015, 6. [Google Scholar] [CrossRef]
  10. Raza, S.; Wallgren, L.; Voigt, T. SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Netw. 2013, 11, 2661–2674. [Google Scholar] [CrossRef]
  11. Nahrstedt, K. Internet of Mobile Things: Challenges and Opportunities. In Proceedings of the 23rd International Conference on Parallel Architecture and Compilation Techniques, Edmonton, AB, Canada, 24–27 August 2014; pp. 1–2. [Google Scholar]
  12. Korte, K.D.; Sehgal, A.; Schönwälder, J. A study of the RPL repair process using ContikiRPL. In Proceedings of the IFIP International Conference on Autonomous Infrastructure, Management and Security, Luxembourg, 4–6 June2012; pp. 50–61. [Google Scholar]
  13. Mayzaud, A.; Sehgal, A.; Badonnel, R.; Chrisment, I.; Schönwälder, J. A study of RPL DODAG version attacks. In Proceedings of the IFIP International Conference on Autonomous Infrastructure, Management and Security, Brno, Czech Republic, 30 June–3 July 2014; pp. 92–104. [Google Scholar]
  14. Levis, P.; Patel, N.; Culler, D.; Shenker, S. Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In NSDI’04: Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation; USENIX Association: Berkeley, CA, USA, 2014. [Google Scholar]
  15. Bhar, J. A Mac Protocol Implementation for Wireless Sensor Network. J. Comput. Netw. Commun. 2015, 2015, 697153. [Google Scholar] [CrossRef]
  16. Khan, Z.A.; Belleudy, C.; Auguin, M. Analytical Model for Energy Consumption Analysis in Grid Based Wireless Sensor Networks. In Proceedings of the 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, Egypt, 20–23 December 2009; pp. 1–5. [Google Scholar]
  17. Khan, Z.A.; Abbasi, U. Evolution of Wireless Sensor Networks toward Internet of Things. In Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications; CRC Press: Boca Raton, FL, USA, 2016; Chapter 7; pp. 179–200. [Google Scholar]
  18. Kumar, J.; Ramesh, P.R. Low Cost Energy Efficient Smart Security System with Information Stamping for IoT Networks. In Proceedings of the 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), Bhimtal, India, 23–24 February 2018; pp. 1–5. [Google Scholar]
  19. Sivanathan, A.; Sherratt, D.; Gharakheili, H.H.; Sivaraman, V.; Vishwanath, A. Low-cost flow-based security solutions for smart-home IoT devices. In Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bangalore, India, 6–9 November 2016; pp. 1–6. [Google Scholar]
  20. Karlof, C.; Wagner, D. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Netw. 2003, 1, 293–315. [Google Scholar] [CrossRef]
  21. Wallgren, L.; Raza, S.; Voigt, T. Routing Attacks and Countermeasures in the RPL-based Internet of Things. Int. J. Distrib. Sens. Netw. 2013, 2013, 794326. [Google Scholar] [CrossRef]
  22. Khan, Z.; Herrmann, P. Recent Advancements in Intrusion Detection Systems for the Internet of Things. Secur. Commun. Netw. 2019, 2019, 1–19. [Google Scholar] [CrossRef]
  23. Vishwakarma, R.; Jain, A.K. A Honeypot with Machine Learning based Detection Framework for defending IoT based Botnet DDoS Attacks. In Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25 April 2019; pp. 1019–1024. [Google Scholar]
  24. Zhang, W.; Zhang, B.; Zhou, Y.; He, H.; Ding, Z. An IoT Honeynet based on Multi-port Honeypots for Capturing IoT attacks. IEEE Internet Things J. 2019, in press. [Google Scholar] [CrossRef]
  25. Anirudh, M.; Thileeban, S.A.; Nallathambi, D.J. Use of honeypots for mitigating DoS attacks targeted on IoT networks. In Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, 10–11 January 2017; pp. 1–4. [Google Scholar]
  26. Hakim, M.A.; Aksu, H.; Uluagac, A.S.; Akkaya, K. U-PoT: A Honeypot Framework for UPnP-Based IoT Devices. In Proceedings of the 2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC), Orlando, FL, USA, 17–19 November 2018; pp. 1–8. [Google Scholar]
  27. Semic, H.; Mrdovic, S. IoT honeypot: A multi-component solution for handling manual and Mirai-based attacks. In Proceedings of the 2017 25th Telecommunication Forum (TELFOR), Belgrade, Serbia, 21–22 November 2017; pp. 1–4. [Google Scholar]
  28. Surnin, O.; Hussain, F.; Hussain, R.; Ostrovskaya, S.; Polovinkin, A.; Lee, J.; Fernando, X. Probabilistic Estimation of Honeypot Detection in Internet of Things Environment. In Proceedings of the 2019 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 17–20 February 2019; pp. 191–196. [Google Scholar]
  29. Dowling, S.; Schukat, M.; Melvin, H. A ZigBee honeypot to assess IoT cyberattack behaviour. In Proceedings of the 2017 28th Irish Signals and Systems Conference (ISSC), Killarney, Ireland, 20–21 June 2017; pp. 1–6. [Google Scholar]
  30. Jeremiah, J. Intrusion Detection System to Enhance Network Security Using Raspberry PI Honeypot in Kali Linux. In Proceedings of the 2019 International Conference on Cybersecurity (ICoCSec), New York City, NY, USA, 22–25 July 2019; pp. 91–95. [Google Scholar]
  31. Hamada, A.O.; Azab, M.; Mokhtar, A. Honeypot-like Moving-target Defense for secure IoT Operation. In Proceedings of the 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 1–3 November 2018; pp. 971–977. [Google Scholar]
  32. La, Q.D.; Quek, T.Q.S.; Lee, J.; Jin, S.; Zhu, H. Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things. IEEE Internet Things J. 2016, 3, 1025–1035. [Google Scholar] [CrossRef]
  33. Herrmann, P. Trust-Based Protection of Software Component Users And Designers; Springer: Berlin, Germany, 2003; pp. 75–90. [Google Scholar]
  34. Casilari, E.; Cano-García, J.M.; Campos-Garrido, G. Modeling of Current Consumption in 802.15.4/ZigBee Sensor Motes. Sensors 2010, 10, 5443–5468. [Google Scholar] [CrossRef] [PubMed]
  35. Khan, Z.A. Using energy-efficient trust management to protect IoT networks for smart cities. Sustain. Cities Soc. 2018, 40, 1–15. [Google Scholar] [CrossRef]
  36. GNU Octave–Scientific Programming Language. Available online: https://www.gnu.org/software/octave/ (accessed on 26 February 2020).
  37. MATLAB. Available online: https://www.mathworks.com/products/matlab.html (accessed on 26 February 2020).
  38. Coulson, G.; Porter, B.; Chatzigiannakis, I.; Koninis, C.; Fischer, S.; Pfisterer, D.; Bimschas, D.; Braun, T.; Hurni, P.; Anwander, M.; et al. Flexible Experimentation in Wireless Sensor Networks. Commun. ACM 2012, 55, 82–90. [Google Scholar] [CrossRef]
  39. Gluhak, A.; Krco, S.; Nati, M.; Pfisterer, D.; Mitton, N.; Razafindralambo, T. A survey on facilities for experimental internet of things research. IEEE Commun. Mag. 2011, 49, 58–67. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.