Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains

Iain Baird,Baraq Ghaleb,Isam Wadhaj,Gordon Russell,William J. Buchanan
DOI: https://doi.org/10.3390/electronics13173467
IF: 2.9
2024-09-03
Electronics
Abstract:In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facilitate efficient data routing. However, RPL networks are susceptible to various security threats, with Sybil and flood attacks being particularly detrimental. Sybil attacks involve malicious nodes generating multiple fake identities to disrupt network operations, while flood attacks overwhelm network resources by inundating them with excessive traffic. This paper proposes a novel mitigation strategy leveraging Bloom filters and hash chains to enhance the security of RPL-based IoT networks against sybil and flood attacks. Extensive simulation and performance analysis demonstrate that this solution significantly reduces the impact of sybil and flood attacks while maintaining a low power consumption profile and low computational overhead.
engineering, electrical & electronic,computer science, information systems,physics, applied
What problem does this paper attempt to address?