iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.3390/s20051300
Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment
Next Article in Journal
Transmission Characteristics Analysis and Compensation Control of Double Tendon-sheath Driven Manipulator
Next Article in Special Issue
Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform
Previous Article in Journal
Real-Time Estimation of Temperature Time Derivative in Inertial Measurement Unit by Finite-Impulse-Response Exponential Regression on Updates
Previous Article in Special Issue
An Identity Authentication Method of a MIoT Device Based on Radio Frequency (RF) Fingerprint Technology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment

1
Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248 002, India
2
Center for Security, Theory and Algorithmic Research, International Institute of Information Technology, Hyderabad 500 032, India
3
Federal University of Piauí (UFPI), 64049-550 Teresina-Pi, Brazil
4
Instituto de Telecomunicações, 1049-001 Lisbon, Portugal
5
School of Electronics Engineering, Kyungpook National University, Daegu 41566, Korea
*
Author to whom correspondence should be addressed.
Current address: School of Electronics Engineering, Kyungpook National University, 80 Daehak-ro, Sangyeok-dong, Buk-gu, Daegu 41566, Korea.
Sensors 2020, 20(5), 1300; https://doi.org/10.3390/s20051300
Submission received: 18 January 2020 / Revised: 21 February 2020 / Accepted: 23 February 2020 / Published: 27 February 2020
(This article belongs to the Special Issue Security and Privacy in Wireless Sensor Network)

Abstract

:
The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes ( S H A s) have some properties (for example, they first attract the other normal nodes for the shortest path to the destination and when normal nodes initiate the process of sending their packets through that path (i.e., via S H A ), the attacker nodes start disrupting the traffic flow of the network). In the presence of S H A s, the destination (for example, sink node i.e., gateway/base station) does not receive the required information or it may receive partial or modified information. This results in reduction of the network performance and degradation in efficiency and reliability of the communication. In the presence of such an attack, the throughput decreases, end-to-end delay increases and packet delivery ratio decreases. Moreover, it may harm other network performance parameters. Hence, it becomes extremely essential to provide an effective and competent scheme to mitigate this attack in EIoT. In this paper, an intrusion detection scheme to protect EIoT environment against sinkhole attack is proposed, which is named as SAD-EIoT. In SAD-EIoT, the resource rich edge nodes (edge servers) perform the detection of different types of sinkhole attacker nodes with the help of exchanging messages. The practical demonstration of SAD-EIoT is also provided using the well known NS2 simulator to compute the various performance parameters. Additionally, the security analysis of SAD-EIoT is conducted to prove its resiliency against various types of S H A s. SAD-EIoT achieves around 95.83 % detection rate and 1.03 % false positive rate, which are considerably better than other related existing schemes. Apart from those, SAD-EIoT is proficient with respect to computation and communication costs. Eventually, SAD-EIoT will be a suitable match for those applications which can be used in critical and sensitive operations (for example, surveillance, security and monitoring systems).

1. Introduction

Internet of Things (IoT) objects include smart sensors (devices) which are capable of gathering and transmitting the sensing information in an IoT network where the human involvement is minimally required. In a generalized IoT architecture presented in Figure 1 [1,2] consists of various scenarios like smart home, smart transportation and smart community. All these scenarios are installed with smart devices such as smart home appliances, smart traffic management appliances and smart environment monitoring devices. These devices are placed and installed in order to communicate with other heterogeneous devices over the Internet via the gateway node(s) ( G W N ) where the traffic goes out and comes in. In this scenario, various users (i.e., smart home users) use the G W N s to access the real-time information via smart devices deployed in the network [1,3,4]. IoT based applications become the essential requirement of the society as they provide people a dependable, responsive and ingenious network connectivity which helps in controlling the remote smart IoT devices in a real time fashion.
In an edge-based communication network, the data is processed near the edge (i.e., edge device) where the data is being generated unlike the centralized data-processing facility. This further improves response time of the network and also saves the bandwidth. In edge computing, there is a corner (i.e., edge) where the data traffic goes out and comes in, which is also named as edge router (device or node) or simply a gateway. In an edge-based IoT communication environment, edge node performs heavy computations on data on behalf of the smart IoT devices which have limited computational, communication and storage resources. The data analysis is performed near the sensing devices which speed up the process of data analysis and further reduce the decision making time [5,6]. Edge-based IoT communication environment (EIoT) is better than the cloud-based architecture because of its enhanced and improved performance with moderate cost. EIoT may have different applications such as smart cities, smart health care system and smart environment monitoring like the cloud computing communication environment. However, at the same time, EIoT suffers from several privacy and security problems. EIoT consists of different devices such as edge router (gateway node), various users and smart devices. Most of the time interested users can access real-time data possessed by the smart devices [3,5,6,7,8]. For such kind of communication environment, edge computing provides additional benefits such as “enhanced security, decreased bandwidth and reduced latency”. Henceforth, it is promising communication technology for different IoT applications.
Edge-based IoT architecture for smart home scenario is presented in Figure 2. In this scenario, certain smart devices are deployed to monitor and support the day-to-day activities inside a home. The smart devices (i.e., IoT sensors) sense, process and send the data of home appliances to the nearby node (edge device). The edge server receives and further processes the data and forwards it to the cloud server. The authenticated (genuine) smart home users can access the data of the smart home through the cloud servers. The advantage of this architecture is that the resource rich edge devices can do processing on behalf of resource constrained smart devices. Furthermore, edge devices can also be utilized for other types of tasks, such as for the detection of intrusion in the network as they are powerful devices (resource rich nodes) of the network. Hence, the same approach is followed in this paper.
Additionally, Figure 3 is also provided which consists of different kinds of devices (for example, edge router (gateway) and smart devices, i.e., IoT sensors and cloud servers). The task of an IoT sensor is to sense, process and transmit the data of environmental phenomena (i.e., humidity level, temperature, pressure, etc.) to the edge node. IoT smart devices (IoT sensors) are resource-constrained with limited memory, battery backup and processing capability, whereas the edge node is rich in resources (in terms of memory, battery power to sense and process the data and long communication ranges). Then an edge node processes and analyzes the received data and after that it transmits the processed data to the remote server(s) over the cloud. However, such type of communication environment is vulnerable to various security threats which lead to significant security problems as different attacks (for instance, routing attacks, sybil attack, data leakage, replaying of old messages, man-in-the middle, impersonation, physical capturing of smart devices, password guessing and privileged insider attacks) are possible [1,3,6,9].
Zhao et al. [10] designed a mechanism to detect location injection attacks (LIAs), called ILLIA. ILLIA is based on the “k-anonymity-based privacy preservation against LIA in continuous location-based services (LBSs) queries”. They emphasized that the attackers attempt to attack some particular users who they are interested in. Such type of user is referred to as high-risk user. ILLIA has the ability to protect LIA without having advance knowledge of how fake locations are exploited. At the same time, ILLIA also maintains high quality of services.
Wang et al. [11] proposed another intrusion detection approach, known as MIASec. It provides “input data indistinguishability” and defends against membership inference attacks in “Machine Learning as a Service (MLaaS)”. In a “membership inference attack”, an attacker is provided with given black-box access to a target classifier and inclines to infer if a specific record is covered in the training set or not.

1.1. Attack Schema of Sinkhole Attack in Edge-based IoT Environment

A possible scenario of sinkhole attack in EIoT environment provided in Figure 4 represents the flow of network traffic under the presence of S H A s. The communication scenario of EIoT under the normal flow of traffic has been presented in Figure 3. Each IoT smart device (i.e., IoT sensor) can sense and transmit the information to the destination (i.e., edge device/node) under the normal flow of traffic. After collecting the data from different IoT devices, an edge node can process and analyze the data and then transmit the information to the cloud server for further processing and storage.
An adversary, say A , can physically capture some IoT smart devices as the devices are installed (deployed) in an unattended (hostile) environment where 24 × 7 h physical monitoring may not be feasible. It further helps A to physically capture some nodes (IoT sensors). Thus, A can extract the stored sensitive information by applying power analysis attacks [12,13]. A can also install malicious sinkhole attack by launching script in the IoT devices which can execute the attack [14,15,16,17,18]. Then, A can deploy these malicious nodes in the target area to launch the required attack. When S H A s start working in the network, the confidential information may be leaked, delayed or lost [17], which can further trouble the entire functioning of the network. Therefore, a robust mechanism to defend against S H A s is required. Hence, intrusion detection technique for EIoT has become one of the primary research problems in recent years [14,15,16,17,19,20,21,22,23,24].

1.2. Goal of Designing Proposed Scheme

Sometimes IoT devices are installed in an “unattended (hostile) environment” (for example, smart security and surveillance), where the ceaseless physical monitoring of these devices [25,26,27,28] is not possible. A may take the advantage of lack of physical monitoring and captures some legitimate IoT sensor nodes. It is worth noticing that the S H A s have several interesting properties, such as they first attract the other normal nodes for the shortest path to the destination, and when normal nodes start sending their packets through that path (i.e., via S H A ), the S H A s start disrupting the flow of the traffic. As a result, the S H A s may or may not forward the packets to the destination. Moreover, it may forward the packets selectively (for example, forwarding of packets of a particular network service (i.e., UDP packets) and restricting the others (i.e., TCP packets)). The packets are passed through the S H A s, which may delay, drop or modify the information inside these packets. An EIoT network consists of resource rich edge nodes (servers) and resource constrained sensing devices. The resource rich edge nodes can be used to detect the presence of attacker nodes. In our proposed architecture, the edge nodes are assumed to be the destination nodes, which receive the packets from the other neighbour nodes. In the presence of S H A s in EIoT, an edge node may not receive the information or it may receive modified or partially modified information. It then degrades the performance, efficiency and reliability of the communication happening in EIoT. In the presence of S H A s, there are various chances: (a) decrement in throughput of the network, (b) increment in end-to-end delay and (c) decrement in packet delivery ratio. The sinkhole attack has been investigated in recent years in wireless sensor networks and several solution were proposed. However, the chance of occurrence of sinkhole attacks in IoT environment is also high. The sinkhole attack detection techniques for Wireless Sensor Networks (WSNs) are not directly applicable in IoT. Therefore, a new scheme to mitigate sinkhole attacks in IoT is required. Hence, an effective intrusion detection scheme for protecting sinkhole attacks in an EIoT communication environment has been designed.

1.3. Attack Model

The widely followed “Dolev-Yao threat model (known as the DY model)” [29] can be used in the designing of SAD-EIoT, where “any two communicating entities communicate over an insecure public channel” [30]. Thus, the communication channel is treated as insecure and also the end-point entities (i.e., IoT sensors) are not considered to be trusted. Other possibilities of the sinkhole attack can also be considered. It is possible that an attacker A can physically capture some IoT smart devices (for example, IoT sensors) and take out the desired sensitive information from its memory [12,13]. A can clone new malicious nodes with sinkhole attack functionality by making use of extracted information. After the manufacturing of these malicious devices (i.e., S H A s), A can directly deploy them in the network [16,17,24]. As discussed in Section 1.1, under the successful execution of a sinkhole attack in EIoT, the data packets may get lost, dropped, delayed or modified. This may cause degradation in the performance of the communication in EIoT. Furthermore, this may cause the reduction in the throughput and packet delivery ratio of the network along with the increment in end-to-end delay. Hence, a strong intrusion detection mechanism to protect against the sinkhole attack is desirable in EIoT environment.

1.4. Research Contributions

The research contributions made in the proposed scheme are provided below.
  • A new intrusion detection scheme for the detection of sinkhole attack in edge-based IoT environment (SAD-EIoT) has been proposed.
  • SAD-EIoT is shown to be secure against sinkhole attacks in EIoT. It is validated through security analysis and also the results obtained through the NS2 simulation.
  • Furthermore, SAD-EIoT is compared with other closely related existing techniques. The conducted comparison demonstrates that SAD-EIoT performs better than other existing techniques.

1.5. Structure of the Paper

The remainder of the paper is organised as follows. In Section 2, the background study of other related existing techniques is provided. Section 3 gives in-depth details of the designed intrusion detection scheme for sinkhole detection (SAD-EIoT) in EIoT environment. The research process and research methodology of SAD-EIoT is also explained here. Section 4 contains the details of various mathematical models. Section 5 contains the security analysis of SAD-EIoT, which proves that SAD-EIoT is competent and efficient enough to defend sinkhole attacks. The simulation study of SAD-EIoT using the widely-used NS2 tool is further provided in Section 6. Next, the performance comparison of SAD-EIoT with other closely related existing schemes is provided in Section 7. Finally, the work is concluded in Section 8.

2. Background

This section contains the background study of the various types of available intrusion detection techniques for Internet of Things and and wireless sensor network. The details are as follows.
Salehi et al. [31] designed a mechanism to detect sinkhole attack in Wireless Sensor Networks (WSNs). In the proposed mechanism, the attackers’ nodes are detected by considering the flow of packets in the network. First, the intrusion region is identified and then after collected data evaluation, the malicious nodes are identified. However, the presented mechanism raises the high false positive rate. Wang et al. [32] proposed a method to mitigate anomalies in a cluster-based WSN. A real time data monitoring system is used to analyse the data packets in the network, where any type of node (edge nodes, source nodes and sensors) can be compromised by an attacker node. Three types of detection schemes such as intelligent hybrid intrusion detection system (IDS), hybrid IDS and misuse IDS were used. The attacker nodes are identified by the misuse of data identification and anomaly detection. However, their implemented mechanism provides marginally improved detection rate.
Hamedheidari et al. [20] suggested a technique to defend WSN against the sinkhole attacks which uses mobile agent to inform the neighbours to prevent the attack. However, the overheads induced by the mobile agents reduce the performance of the network. Wang et al. [33] used “Gaussian distribution technique” for detection of intrusions. They discussed two methods to defend malicious nodes, called “single-sensing” and “multiple-sensing”.
Wang et al. [34] discussed the expected probability of “Intrusion Detection”. The provided solution uses parameters, such as node density, range in heterogeneous and homogeneous WSN for sensing anomalies. The calculated probability is used to analyse the efficiency and performance of the proposed method. To protect WSN from “misleading attackers in a multihop routing”, Zhan et al. [35] also suggested a framework named as“Trust-Aware Routing (TARF)”, which is capable of resolving the intrusions in dynamic sensor networks. Without making use of “time synchronisation and geographic location of the sensor nodes”, the trusted and energy saver routes can be identified.
Shin et al. [36] discussed various structures of “Wireless Industrial Sensor Networks (WISN)”. They proposed a hierarchical design to mitigate the attacks. “One-hop clustering” was the key point, which was utilised in the presented design. To mitigate the hierarchical anomalies, the logical protocols were used. Yu et al. [37] provided information about different kinds of intrusions and also the methods used to resolve them. A comprehensive literature survey was provided to highlight the existing standard and associated techniques in two different categories, which are for securing data and its routing.
Liu et al. [38] demonstrated an intrusion detection system to prevent sinkhole attack for the “Internet of Things (IoT)” communication. Their proposed scheme not only detects the S H A s but also bypasses the attack region by making use of routing mechanisms named as “hop-by-hop basis and multihop basis”. The location of the attacker nodes is also determined by their presented scheme. However, their scheme exhibits high computation and communication costs. Chen et al. [39] proposed a “Low-rate Denial of Service (LDoS)” attack mitigation technique which can be used for both WSN and IoT. They combined “Hilbert Huang transformation and trust evaluation” methods to find LDoS attacker nodes in WSN.
Fang et al. [40] examined the need for cyber security in “information-centric networking (ICN)”. They analysed the typical attack behaviours and defence methods. Furthermore, they presented a “Fast and Efficient Trust Management Scheme (FETMS)” for mitigating the On-Off attack with the help of communication trust, data trust and reputation values. Pongle et al. [41] investigated the possible attacks on “IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN)” and “IPv6 Routing Protocol for Low power and Lossy Networks (LLNs), called RPL”. They highlighted the possible techniques to mitigate these attacks. The emphasis was on protecting the RPL network from various attacks, such as Sybil, blackhole, wormhole and clone ID attacks.
Yang et al. [42] did a survey on IoT communication environment. They identified some constraints for IoT devices, for example, computing resources and battery lifetime, and some solutions were also suggested. Lyu et al. [43] proposed a “selective authentication based geographic opportunistic routing (SelGOR)” to mitigate the DoS attacks, which can fulfil the requirements of authenticity, integrity and reliability in WSNs. By “statistic state information (SSI)” of links between nodes, SelGOR took the advantage of an SSI-based trust model to increase the network efficiency in terms of data delivery. SelGOR used an entropy-based algorithm to maintain integrity which was also able to detect DoS attacker nodes to improve the performance.
He et al. [44] proposed a scheme called “sector-based random routing (SRR)” to resolve the source location privacy problem. Under the implementation of the proposed method, the energy consumption is also reduced. As per SRR mechanism, the routing paths are disappeared by dividing the network into several sectors, which further improves the security.
Airehrour et al. [45] proposed a SecTrust-RPL protocol that used “SecTrust” system. It identifies some nodes to make decisions for routing using trust. The trust computation was done through exchanged packets between the nodes to determine the trustworthiness. It can identify the attacker nodes and also improve the throughput of the RPL. Sicari et al. [46] proposed a technique to mitigate DoS attack against the IoT middleware, called “networked Smart object (NOS)”. They designed a variable number of dynamic virtual ports on each NOS, and the second thing is that it binds the identifier virtual port of each NOS’s port to UID, which was more tedious to predict by attacker nodes.
Bhosale et al. [47] implemented an intrusion detection technique in which they compared “Received Signal Strength Indicator (RSSI)” value of neighbour nodes and the victim nodes with the threshold values. They kept the record of the broadcasting node’s RSSI value, from where the victim packet was disseminated. It helped to locate the presence of attacker node in their technique. Liu et al. [48] developed a detection mechanism for low rate DOS attack. They used the expired state entries and proposed an “enhanced distributed low-rate attack mitigating (eDLAM)” method to mitigate the attacks. Their presented eDLAM can detect an attack based on expired state-entry numbers.
Raoof et al. [49] presented a comparative analysis of “Routing Protocol for Low-Power and Lossy Networks (RPL)”. Some of the routing attacks along with the mitigation methods were also discussed. Mayzaud et al. [50] presented a method to mitigate version number attacks in RPL networks. This was based on “distributed monitoring architecture” which conserves the energy of resource constrained nodes for the “Advanced Measurement Infrastructures (AMI)”. Their detection procedure is performed by the source node after collecting the detection information from all deployed nodes. In addition, Wazid et al. [16,17,24] also discussed intrusion detection schemes for detection of various attacks, including sinkhole, blackhole, hybrid anomaly as well as routing attacks in hierarchical WSNs and edge-based IoT (EIoT) networks.
In Table 1, the comparison to existing intrusion detection techniques is provided. It contains different parameters such as “name of the technique/protocol”, “its goal”, “method used” and “its outcomes and limitations”.

3. The Proposed Sinkhole Attack Detection Scheme

In this section, the different phases of the proposed “sinkhole attack detection scheme for edge-based IoT environment”, called SAD-EIoT, are explained. The different message formats required to describe SAD-EIoT are also presented. Furthermore, the notations and their significance shown in Table 2 are used in the proposed SAD-EIoT.

3.1. Network Scenario

For an edge-based IoT environment, Figure 3 suggests that there is a resource-rich edge device (node/router) which works like a gateway node. For instance,“Personal Digital Assistant (PDA)” can be configured as an edge node [51,52,53]. In an edge-based IoT environment, there are resource-constrained IoT smart devices (i.e., IoT sensors) with limited resources (for instance, MICAz motes [53]). The IoT sensors can be deployed randomly or manually in a required area (i.e., in a forest for environment monitoring) based on application scenarios. After deployment, the first task of sensing devices is to find the neighbours in its communication range. To perform such a task, IoT sensors can broadcast “HELLO messages” (containing their identity) to other nodes in their communication ranges. After receiving “HELLO messages” from the neighbouring sensing nodes, each IoT sensor constructs a neighbour list [54]. Every edge node E N j also finds its “physical neighbors” (for example, the IoT sensors). E N j is responsible for anomaly detection in the network. For ensuring secret communications among an edge node and IoT sensing devices, and also among different IoT sensors and itself, a key management protocol, namely the “unconditionally secure deterministic key management” suggested by Das [52] can be utilised. Assume that S K S i , S j and S K E N j , S i are two different symmetric (secret) keys among two neighbouring IoT sensing nodes, say S i and S j and among an edge node E N j and its neighbour IoT sensing node S i . The method for key establishment can be defined on the basis of deterministic key management scheme available in [52]. With the help of the established secret keys, neighbour nodes can securely communicate with each other in the edge-based IoT environment. The delay between S i and E N j can be computed by using the technique given in [17,55].
Assume each transmitted packet of a sensing node contains a distinct sequence number and the sequence numbers are kept in an ascending order. Next, t x ( j , k ) denoted as a packet j’s receiving time on a node k corresponding to the “perfect clock t r ( j , k ) ” and the packet j’s transmitting time on the node k. The transmission or reception time of a message is considered as the “time just before the first byte of a packet (message) is sent or received”. Let a and b represent the source and destination nodes along with a chosen path. If t r ( j , a ) is another parameter denoting the packet j’s generation time on a, the packet j’s “end-to-end delay for a path” is calculated as [16,17,24]:
t d ( j ) = t r ( j , b ) t r ( j , a ) .
Now, if the packet j’s waiting time at node k on the path is represented by t w ( j , k ) , then t w ( j , k ) = t x ( j , k ) t r ( j , k ) . It is important to notice that waiting time t w ( j , k ) incorporates node’s backoff time for competing for the channel. Therefore, end-to-end delay is calculated as
t d ( j ) = k = 1 n 1 t w ( j , k ) ,
where the number of total nodes in that path is denoted by n. Since the IoT sensors do not have tamper-resistant hardware in general due to the cost factor, an adversary A gets a chance to extract all the required information from the memory of a physically captured IoT sensor node [12,13]. A can then store the extracted information in the memory of the newly manufactured (cloned) IoT sensor node and can also load the sinkhole attack functionality program required to launch that attack in the network.

3.2. Process Involved in SAD-EIoT

The process involved in SAD-EIoT is explained using a sequence diagram of sinkhole attack detection through SAD-EIoT (see Figure 5). Its details are given below.
Edge node keeps all the important information, such as identity ( I D S i ) of every IoT sensing node S i , ranks information and its battery level. As per the nature of sinkhole attack, the malicious node (sinkhole attacker node, say S H A k ) advertises a shortest path to the destination (i.e., edge node) and the neighbouring IoT sensor nodes get attracted towards that path and send their packets to S H A k as they assume that the shortest path to the destination is through S H A k . After receiving the data from neighbour IoT sensors, S H A k can play with the communication. S H A k can perform the following malicious tasks:
  • Dropping of the packets
  • Modification of information in the packets
  • Forwarding the packets selectively (i.e., forwarding of UDP packets and dropping of TCP packets)
  • Forwarding the packets with some delay
The sinkhole attack can disturb the overall configuration of the network as it affects most of the important network parameters. For instance, it may reduce the throughput (sometimes, it tends to zero when S H A k drops all packets) and increase the end-to-end delay along with extremely low packet delivery ratio [16,17,22,24]. Since an edge node is resource rich in the network, it can be easily used for detection of sinkhole attacks. The detection of sinkhole attack is executed in the following two phases:
Phase 1 (Identifying the presence of sinkhole attacker nodes): In this phase, we identify the existence of S H A s in the network by applying the steps in Algorithm 1. The parameters, such as node identity I D S i , hop count from E N j ( H C S i ), remaining energy at the nodes R E N S i and rank information R S i are used. An IoT node S i is recognised as a suspected S H A , if following conditions hold [9,17,18]:
  • H C S i < H C θ
  • R E N S i < R E N S i θ
  • R S i { R L S i , R U S i }
Here, H C θ and R E N S i θ are threshold values of the network hop count and remaining energy, respectively. R L S i and R U S i are lower and upper limits of ranks for a particular node (i.e., S i ), respectively. A node loses some energy whenever it transmits or receives packets and the edge node knows about the initial battery status of all the nodes. If an attacker node provides modified battery status to the edge node, in turn that edge node can calculate the battery (energy) value using the available technique in the literature. A similar approach can be applicable for hop counts and rank information. By the end of this phase, a list l of suspected attacker nodes is prepared, if they exist in the network.
Phase 2 (Confirming the existence of sinkhole attacker nodes): In this phase, the confirmation of identified nodes as the sinkhole attacker or some battery drained nodes is done. The steps stated in Algorithm 2 are required to perform this task. In this phase of attack detection, the possible cases are outlined below.
  • Case 1: If E N j does not get messages from a doubtful node S i , it attempts to figure out that node S i as S H A k or normal (genuine) node which has depleted its entire battery (might be a node failure). In such a situation, E N j transmits μ s d q to S i and waits some time for its response. If the condition W T > W T θ holds, where W T θ is the waiting time’s threshold, it will indicate the expiry of waiting time. If both response message ( μ s r ) as well as data message ( μ d ) from S i are not received by E N j , it makes a decision as the S i ’s failure. Note that additional factors like network congestion have been included in W T θ .
  • Case 2: If E N j gets μ s r , but the μ d is not received by E N j , S i is identified as the “sinkhole attacker node” S H A k . It is also determined that S H A k is a kind of S H A which consumes all packets and does not forward them towards the destination (i.e., E N j ).
  • Case 3: If E N j receives the μ s r and also ( μ d ) from S i , it checks the integrity of μ d by using hashing algorithm (i.e., SHA-1 or SHA-256 [56]). If the integrity does not hold, S i is treated as the S H A k which has modified μ d .
  • Case 4: E N j receives μ s r and also μ d from S i , but the quality of service of the network is not up to the mark [57]. Since E N j is a powerful node, it can run some technique to maintain the quality of the service of the network [57]. For example, S H A k may forward the UDP packets but not the TCP packets. If all these features are included then it becomes a sign of selective forwarding of packets (a kind of packet forwarding attack) [57,58,59]. For the detection purpose, E N j can execute the following steps if the count of packets for a particular service (i.e., TCP) does not exceed the threshold value of count of packets in a particular duration of time. E N considers S i node as the S H A k . Further, note that the threshold value of count of packets in a particular duration of time is an empirical value which can be set at the E N at the time of the deployment of the nodes in the network.
  • Case 5: When the μ s d q is transmitted by E N j to S i , it waits some time for the response message. If the condition W T > W T θ holds, it will indicate the expiry of waiting time. If E N j receives μ s r , it waits for receipt of μ d from S i . If E N j receives μ d after the expiry of the waiting time (i.e., W T > W T θ ), the node S i is detected as the S H A k because it delays the packets before forwarding them towards the destination (i.e., E N j ).
As the detection work proceeds with the time, E N tries to detect malicious sinkhole (attacker) nodes and also adds them to the list of sinkhole attacker nodes S H A l i s t . In the “anomaly alarm system phase”, E N j ignores the detected S H A k i , where i = 1 , 2 , , n and raises an alert to warn the other legitimate nodes about the existence of S H A s. After that, the legitimate IoT devices remove the entry of S H A k node from its neighbour list and start sending their packets to the other possible route(s).
The sequence diagram of sinkhole attack detection through SAD-EIoT provided in Figure 5 is helpful to explain the overall communication process of SAD-EIoT. It has the following important stages:
  • Network analyser: An edge node E N j performs the analysis of the network behaviour. E N j then identifies normal and abnormal activities of the network.
  • Anomaly detector: For the detection of S H A s, two different phases are used, namely Phase 1 for identifying the existence of S H A s and Phase 2 for confirming the existence of S H A s. E N j does the work of sinkhole node detection by using the steps of S H A existence algorithm in EIoT (Algorithm 1). After the completion of all steps mentioned in Phase 1, a list of doubted nodes l is constructed that may or may not have the attacker nodes. To confirm the existence of S H A s in the network, E N j executes the steps of S H A confirmation algorithm in EIoT (see Algorithm 2). After the successful completion of Phase 2, a list of confirmed S H A s and S H A l i s t is obtained which contains the entries for all types of S H A s which exist in the network.
  • Alarm system: After the successful completion of both phases of S H A s detection, the list S H A l i s t is generated. The E N j blacklists these malicious nodes and also sends alarm messages to other legitimate IoT devices (i.e., IoT sensor nodes). Then, these legitimate nodes remove the entries of S H A s from their neighbour list and start sending their packets to the other possible available route(s).

3.3. Formats of Messages Used in Sinkhole Attack Detection

SAD-EIoI uses four messages which are also utilised in some existing techniques: [16,17,18,24], namely, (i) “status and data query message μ s d q ”, (ii) “status response message μ s r ”, (iii) “data message μ d ” and (iv) “information message μ i n ”. The structures of these different messages are provided below.
  • Status and data query message μ s d q : The message μ s d q is shown in Figure 6. E N j transmits μ s d q to all IoT devices (sensors). This message is constructed using the different fields, such as an E N j ’s identity I D E N j , an IoT device S i ’s identity I D S i , the information field s d q r q and also the hashed message authentication code ( m s d q ) , where m s d q = h ( S K E N j , S i | | I D E N j | | I D S i | | s d q r q ) .
  • Status response message ( μ s r ) : The structure of μ s r provided in Figure 7 is composed of different fields, such as I D S i , “remaining energy (battery power)” R E N S i of S i , “rank information” R S i of S i , the information field s r p and m s q = h ( S K E N j , S i | | I D S i | | R E N S i | | R S i | | s r p ) . S i sends the message μ s r to E N j . For saving energy, an IoT sensing device can utilize any one of the modes (“sleep”, “idle” and “working”) [60,61]. For the detection of sinkhole attack, the information about the two modes is needed (i.e., “idle” and “working”), because sensing devices cannot respond when they are in the sleeping state. The s r p may contain two response types: 0 (idle state) and 1 (working state).
  • Data message ( μ d ) : The structure of μ d provided in Figure 8 is composed of different fields, for example, I D S i , R E N S i and R S i of S i , ϖ S i as the sensing data needs to be transmitted to E N , and m d = h ( S K E N j , S i | | I D S i | | R E N S i | | R S i | | ϖ ) . Note that session key S K E N j , S i can be used to encrypt the data, if it is required.
  • Information message ( μ i n ) : After performing the detection of S H A s, E N j sends the information message to alert the other legitimate IoT sensors. The structure of μ i n provided in Figure 9 is also composed of different fields, like I D E N j and detection information field Υ i n contains the information of the detected S H A s.

3.4. Research Methodology of SAD-EIoT

In this section, the research methodology of SAD-EIoT is discussed. SAD-EIoT can detect the sinkhole attacker nodes in an EIoT environment efficiently. The detection procedure happens in two phases. Phase 1 identifies the S H A s by the “sinkhole attacker node existence algorithm”, whereas Phase 2 allows to see the existence of the doubted nodes (either normal or S H A s) are identified by using the “sinkhole attacker node confirmation algorithm”. These phases are discussed in the subsequent sections.

3.4.1. Sinkhole Attacker Node Existence Algorithm in EIoT

The “sinkhole attacker node existence algorithm in EIoT” is discussed in Algorithm 1 which is used to recognise the existence of the suspected S H A s. It utilises various parameters, such as node S i ’s identity I D S i , hop count H C S i from E N j , remaining energy at nodes R E N S i and rank information R S i . This algorithm finds the S H A s, in the case of a sensor node S i , if the conditions H C S i < H C θ , R E N S i < R E N S i θ and R S i { R L S i , R U S i } are satisfied, where H C S i θ and R E N S i θ are threshold values of hop count and remaining energy, respectively. Moreover, ( R L S i , R U S i ) is a pair of lower and upper limits of rank for a particular node S i . Algorithm 1 also provides a list of suspicious attacker nodes, say l , if these suspicious S H A s exist in the network.
Remark 1.
If the “hop count” H C S i of an IoT sensing node S i from E N j is less than the network hop count threshold H C θ , that is, if H C S i < H C θ , S i may be considered as S H A .
Example 1.
To validate the statement of Remark 1, the scenario provided in Figure 4 should be considered. If a node S i is far away from a destination E N j , that is, its hop count value from E N j is high, chances are that this will not be an exact S H A . In order to be an exact S H A , this particular node should be as close as possible to the destination E N j . If a sinkhole attacker node is closer to E N j , it can get a greater number of packets from the neighbour nodes and it may further damage the network operations quickly. Otherwise, if the S H A is far away from the destination E N j , in that case it will not get a greater number of packets. In this situation, the damage to the network will be minimum. Thus, an attacker’s advantage to launch the sinkhole attack will be very low. The empirical threshold value of hop count of the network, H C θ , can be set at the time of the deployment of the IoT sensors and it can be compared to the hop count value for that particular node H C S i to identify a sign of intrusion in the network. Therefore, if H C S i < H C θ holds, S i can be treated as a suspected S H A .
Remark 2.
If the “remaining energy under the normal behaviour and abnormal behaviour of an IoT sensing node S i ” are R E N S i θ and R E N S i , respectively, the criteria R E N S i < R E N S i θ needs to hold for a sinkhole attack.
Example 2.
To justify Remark 2, the scenario available in Figure 4 should be considered. A node S i receives a lower number of messages if it is a normal node. However, if it is a S H A , it will definitely receive a greater number of messages as per the mechanism of a sinkhole attack. When a node receives a greater number of packets, its battery depletion will be greater as compared to the normal node. Suppose E N j sets a threshold value of remaining energy for a particular node S i as R E N S i θ and in actual scenario it is R E N S i . So, if a node S i is a S H A , the condition R E N S i < R E N S i θ turns out to be valid. Otherwise, S i is a normal sensor node of EIoT. Therefore, in the case of sinkhole attack, the condition R E N S i < R E N S i θ becomes true.
Algorithm 1 Sinkhole attacker node existence algorithm in EIoT.
1:
for each edge node E N j in edge-based IoT environment do
2:
E N j sends status and data query message ( μ s d q ) to the IoT sensors, S i .
3:
 After receiving μ s d q , each S i computes m s d q = h ( S K E N j , S i | | I D E N j | | I D S i | | s d q r q ) using the shared secret key S K E N j , S i with E N j .
4:
if ( m s d q = m s d q ) then
5:
   μ s d q is valid and S i responses with status response message μ s r = I D S i , R E N S i , R S i , s r p , m s q to E N j using its “current remaining energy” R E N S i and “rank information” R S i .
6:
  After receiving μ s r , E N j recomputes m s q = h ( S K E N j , S i | | I D S i | | R E N S i | | R S i | | s r p ) using the “shared secret key S K E N j , S i ” with S i .
7:
  if ( m s q = m s q ) then
8:
    μ s r is a genuine message.
9:
  end if
10:
end if
11:
 Each S i in edge-based IoT environment sends message μ d = I D S i , R E N S i , R S i , ϖ , m d , if it has anything to send, to E N j using its “current remaining energy” R E N S i and “rank information” R S i .
12:
 After receiving μ d from S i , E N j recomputes m d = h ( S K E N j , S i | | I D S i | | R E N S i | | R S i | | ϖ S i ) using the “shared secret key S K E N j , S i ” with S i .
13:
if ( m d = m d ) then
14:
   μ m d is valid.
15:
end if
16:
 Based on information gathered by IoT sensor S i , E N j checks following condition.
17:
if (( H C S i < H C θ ) & ( R E N S i < R E N S i θ ) & ( R S i { R L S i , R U S i } ) ) then
18:
  Node S i is considered as a suspected S H A .
19:
  Add S i in l .
20:
  Execute sinkhole attacker node confirmation algorithm provided in Algorithm 2.
21:
end if
22:
end for

3.4.2. Sinkhole Attacker Node Confirmation Algorithm in EIoT

The “sinkhole attacker node existence algorithm in EIoT” provides a list of suspected attacker nodes. However, to prove a suspected node is an attacker node, the sinkhole attacker node confirmation algorithm in EIoT, which comes under Algorithm 2, is required.
To perform this task, E N j executes the following steps. If an edge node E N j does not receive data packets from a suspicious node S i , it will try to segregate that node S i as S H A k or normal (genuine) node which completely drained its battery (due to node malfunctioning). In such case, E N j sends μ s d q to S i and waits for some time for its response. If W T > W T θ holds, it indicates the expiry of waiting time. If E N j does not get μ s r and also μ d from S i , it is the case of failure of S i . Note that in the threshold value of waiting time other factors, such as network congestion, are also included. If E N j receives μ s r , but not μ d , S i is confirmed as S H A k . It is also determined that S H A k is a kind of S H A which consumes all packets and does not forward them towards the destination ( E N j ). If E N j receives the μ s r and also μ d from S i , E N j checks the integrity of μ d by using hash algorithm (i.e., SHA1 or SAH256) [56]. If the integrity does not hold, S i is treated as the S H A k which can modify μ d . Another case is that E N j receives μ s r and also μ d from S i but the quality of service of the network is not up to the mark [57]. E N j is a powerful node which can keep the quality of the communication up to the mark [57]. For example, S H A k may forward the UDP packets but not the TCP packets. If all these features are included then it becomes a sign of selective forwarding of packets (a kind of packet forwarding attack) [57,58,59]. For the detection purpose, E N j can execute the following steps if the count of packets for a particular service (i.e., TCP) is less than the threshold value of count of packets in a particular duration of time, that is, P C S i < P C S i θ . Then E N j considers S i node as S H A k . Further note that the threshold value of count of packets in a particular duration of time is an empirical value which can be set at E N j at the time of the deployment of the different nodes. When E N j transmits the μ s d q to S i , it waits for some time for its response. If W T > W T θ holds, where W T θ is the “threshold value of the waiting time”, it indicates the expiry of waiting time. If E N j receives μ s r , it waits for the receiving of μ d from S i . If E N j receives μ d after the expiry of the waiting time ( W T > W T θ ), the node S i is identified as S H A k which can delay the packets before forwarding them towards the destination ( E N j ). After the detection, E N j blacklists and adds S H A s to the list S H A l i s t .
Algorithm 2 Sinkhole attacker node confirmation algorithm in EIoT
1:
for each edge node E N j in edge-based IoT environment do
2:
if edge node E N j does not receive any message then
3:
   E N j transmits μ s d q to a node S i .
4:
  Set W T as W T = W T + 1 .
5:
  if W T > W T θ then
6:
   if E N j receives μ s r but not μ d from node S i then
7:
     S i considered to sinkhole attacker node S H A k which drops packets.
8:
   else if E N j receives both μ s r & μ d from node S i and m d m d then
9:
     S i considered to be S H A k which modifies the packets.
10:
   else if E N j receives both μ s r & μ d from node S i and P C S i < P C S i θ then
11:
     S i considered to be S H A k which selectively forwards the packets.
12:
   else if E N j receives both μ s r & μ d from node S i and W T > W T θ then
13:
     S i considered to be S H A k which delays packets before forwarding them.
14:
   else
15:
    Edge node E N j does not receive the messages μ s r and μ d from the node S i .
16:
    Failure of a node is detected.
17:
   end if
18:
  end if
19:
   E N j blacklists the detected nodes and adds its entry in the list S H A l i s t , and broadcasts its identity I D S H A k to all legitimate IoT sensors.
20:
end if
21:
end for

4. Mathematical Models for SAD-EIoT

In this part of the paper, the various mathematical models utilised in SAD-EIoT such as packet delivery ratio, “throughput” and end-to-end delay for edge-based IoT environment are explained [16,17,24].

4.1. Packet Delivery Ratio

Suppose the symbols P D n , P D a and P D s are respectively the “packet delivery ratios” associated with the normal flow, sinkhole attack and SAD-EIoT. Further, assume that | μ d | , | μ d | , | μ d p a | , | μ d p a | and | μ d 1 | represent the count of “data packets” sent by IoT sensing devices, “authentic packets” received by an edge node, | μ d p a | , “data packets that are not transmitted by sinkhole nodes”, “data packets that are not transmitted by the sinkhole nodes ( T P ) ” and “data packets that are not transmitted by sinkhole nodes ( F N ) ”, respectively. Thus it is clear that | μ d 1 | = | μ d p a | | μ d p a | . The estimation of “packet delivery ratio ( P D ) ” with respect to “normal traffic flow” is given as [16,17,24]:
P D n = | μ d | | μ d | .
Under sinkhole attack, P D can be computed as
P D a = | μ d | | μ d p a | | μ d | .
P D under the proposed method “SAD-EIoT” can also be formulated as
P D s = | μ d | | μ d 1 | | μ d | .
The packet loss rate is an additional important network parameter that is explained as the number of lost packets per unit time and it can be computed as ν l p T d where the “total time (in seconds)” is T d and the total lost packets is denoted by ν l p . It is also very important for a dependable network communication to keep packet loss rate as low as possible. The mathematical model for packet loss rate can be defined in a similar way as the packet delivery ratio.

4.2. Throughput

Let Λ n , Λ a and Λ s represent the “throughput of the network” under the various scenarios, for example, “normal flow”, sinkhole attack and SAD-EIoT, respectively. Let us assume T n , T a and T s are the “packets delivery time” under “normal flow”, sinkhole attack and SAD-EIoT, respectively. Then, the throughput under normal flow of traffic as follows [16,17,24]:
Λ n = | μ d | × p k t s T n .
Similarly, the throughput under sinkhole attack can be computed as
Λ a = p k t s × ( | μ d | | μ d p a | ) T a ,
and the throughput under the deployment of SAD-EIoT is represented by
Λ s = p k t s × ( | μ d | | μ d 1 | ) T s ,
where a data packet size is represented by p k t s .

4.3. End-to-End Delay

Let ν n , ν a and ν s be the “end-to-end delays” under different scenarios such as “normal flow”, sinkhole attack and SAD-EIoT, respectively. Then, the end-to-end delay under normal flow of traffic can be approximated as [16,17,24]:
ν n = ν ,
where ν can be represented as
ν = i = 1 p ( T r e c i T s e n d i ) p ,
T r e c i is the “receiving time”, T s e n d i is the “sending time” of a “packet i” and p is the “total number of packets”.
The end-to-end delay under sinkhole attack is approximated as
ν a = ν n + ν n s h a ,
where n denotes total IoT sensing nodes in the network, n s h a is the count of sinkhole nodes, n = n n s h a counts towards “number of normal nodes for sinkhole attack scenario” and ν n s h a is the “delay corresponding to n s h a sinkhole attacker nodes”. Finally, the “end-to-end delay under the proposed SAD-EIoT” can be computed as
ν s = ν n + ν F N r a ,
where F N r a is the “number of nodes identified as normal nodes” by SAD-EIoT, but these are actually sinkhole nodes, n = n n F N s h a is the normal node count in SAD-EIoT and ν F N s h a represents the delay associated with F N s h a nodes. Hence, if the count of false negative nodes is zero, the end-to-end delay will be ν s = ν n .

5. Analysis of SAD-EIoT

In this part of the paper, the analysis of the security of SAD-EIoT, along with its communication and computational costs is conducted.

5.1. Security Analysis

For an IoT sensing node, say S i , the corresponding edge node has the responsibility to keep information like its identity ( I D S i ) , its “remaining energy R E N S i ”, hop count value H C S i and “rank information R S i ”. If a S H A is placed successfully in EIoT then it can start to damage normal network operations (i.e., transmitted packets can be dropped, delayed, updated or selectively forwarded). Designed SAD-EIoT has the capability to detect S H A s. This work is divided into two phases. In “phase 1”, it first identifies the existence of suspected S H A s in EIoT by using the steps of “Sinkhole attacker node existence algorithm in EIoT (Algorithm 1)”. This algorithm uses parameters, such as node S i ’s identity ( I D S i ) , its “remaining energy R E N S i ”, hop count value H C S i and “rank information R S i ”. A node S i is identified as a suspected S H A if H C S i < H C θ , R E N S i < R E N S i θ and R S i { R L S i , R U S i } where H C θ and R E N S i θ are threshold values of network hop count, remaining energy and R L S i , R U S i are lower and upper limits of ranks for a particular node (i.e., S i ). After successful execution of phase 1, the “sinkhole attacker node confirmation algorithm in EIoT (Algorithm 2)” is accomplished in phase 2. If an edge node E N j does not receive messages from a particular node S i , then first it confirms the node S i is S H A or “a case of node failure”. To confirm this E N j sends the messages μ s d q to node S i , and starts the “waiting time counter”. If waiting time is over and E N j does not receive μ s r and μ d from IoT sensor S i , then it is determined that this is a case of node failure (i.e., S i is a failure node). Otherwise, if E N j receives the μ s r , but it does not receive μ d , S i is detected as S H A which has the capability to drop the packets. All these analyses are preformed by using the above two cases discussed in Section 3.4.2. Similarly, the security of SAD-EIoT for other types of S H A s can be confirmed. Therefore, designed SAD-EIoT is capable enough to defend edge-based IoT communication environment from different types of S H A s.

5.2. Communication Cost

For the communication cost analysis, n nodes in edge-based IoT environment are considered. In a scenario of a normal flow of traffic, each edge node E N j sends n number of messages μ s d q ” to IoT sensors. Then IoT sensors have to reply with n number of “status response messages” to E N j . Moreover, E N j also receives at most n number of “data messages μ d ”. Therefore, total number of messages exchanged in the case of normal flow of traffic can be estimated as 3 n . Whereas in the case of sinkhole attack, E N j only gets n + ( n s a d n s s f ) “data messages μ d ” where n s a d are the messages dropped by sinkhole attacker nodes ( S H A s) which drop the packets and n s s f are the messages dropped by S H A s which selectively drop (in selective forwarding case) the packets. The total number of different messages exchanged under sinkhole attack can be estimated as ( n + n + ( n + ( n s a d n s s f ) ) ) = 3 n n s a d n s s f .
Under the scenario of SAD-EIoT, when E N j does not receive the data messages from some of the S H A s, it resends n s a d + n s s f number of μ s d q messages only to sinkhole message dropping attacker nodes and sinkhole selective forwarding attacker nodes. The sinkhole message dropping attacker and sinkhole selective forwarding attacker nodes send only μ s r messages but not μ d messages. Note that E N j receives n s a d l and n s m d data messages from S H A s which delay the packets and S H A s which modify the packets. Whereas E N j only receives n s a d + n s s f number of μ s r messages. After the successful completion of both phases of proposed mechanism, E N j identifies the different types of sinkhole nodes and sends n ( n s a d l + n s m d + n s a d + n s s f ) information messages to alert the other legitimate nodes of the network. Where n s a d l are messages corresponding to S H A s which delay the packets and n s m d are S H A s which modify the packets. It is understood that E N j does not transmit any information messages to S H A s. Hence, as a result, the total number of messages exchanged under the implementation of SAD-EIoT can be estimated as [ n + n + ( n s a d l + n s m d ) + ( n s a d + n s s f ) + ( n s a d + n s s f ) + ( n ( n s a d l + n s m d + n s a d + n s s f ) ) ] = 3 n + n s a d + n s s f .
It is assumed that identity, “hash digest (output) (if we apply SHA-1 hash algorithm)”, “remaining energy field”, “rank information field” and data fields in various types of messages are of 32 bits, 160 bits, 32 bits, 32 bits and 160 bits, respectively. Therefore, different messages’ sizes can be estimated as μ s d q , μ s r , μ d and μ i n require 384 bits, 416 bits, 416 bits and 192 bits, respectively.

5.3. Computation Cost

As discussed earlier, SAD-EIoT is divided into two phases. In the first phase of SAD-EIoT, the presence of suspected attacker nodes are detected using the steps of the “sinkhole attacker node existence algorithm in EIoT”. Further note that these nodes may or may not be the attacker nodes. If S H A s exist in EIoT, this will be confirmed by Algorithm 2. First Algorithm 1 is executed and then Algorithm 2 will be executed. The different steps of Algorithm 1 and Algorithm 2 are executed in linear time, which can be executed with time complexity O ( n ) , where n is number of IoT sensing nodes installed in EIoT. Thus, the cumulative time complexity of SAD-EIoT is estimated as O ( n ) which is needed for an E N j .
Remark 3.
It is important to notice that in designed SAD-EIoT, an IoT sensor node S i needs to send one “status response message μ s r ” and one μ d to an edge node E N j . Furthermore, S i needs to compute “two HMAC operations” in the transmission of μ s r and μ d messages. Apart from that S i needs another HMAC operation in the validation of μ s d q message. Hash function computations are very lightweight which again surges in very low computational cost for S i node. The provided estimation infers that SAD-EIoT is very helpful and handy for the “extremely resource-constrained IoT sensors in EIoT” due to low computational cost and lower number of messages exchanged.

6. Practical Implementation of SAD-EIoT

In this part of the paper, the designed SAD-EIoT is practically implemented using the widely-used NS2 2.35 simulation software tool [62].

6.1. Simulation Environment

SAD-EIoT is implemented on Ubuntu Linux 14.04 LTS platform using the NS2 simulation software tool [16,17,18]. The considered deployment area is 650 × 250 m 2 . In the considered deployment field, 121 nodes which consist of different devices such as cloud server, IoT sensor nodes and edge router are placed. This deployment field consists of one cloud server along with six edge nodes. Table 3 consists of values of different simulation parameters used in the practical demonstrations. The “Constant bitrate (CBR)/UDP (User Datagram Protocol)” is treated as the traffic type. The considered routing protocol is “Ad Hoc On-Demand Distance Vector (AODV)” which is applicable for routing methods in wireless communications. That supports both “unicast as well as multicast routing” mechanism [63]. The communication range of an IoT device (sensor) is taken to be 100 m.

6.2. Simulation Scenarios

The simulations of EIoT environment are performed for different cases such as normal traffic flow, under sinkhole attack and under the deployment of SAD-EIoT. The information about the different scenarios is provided below.
  • Scenario of normal flow of traffic: The scenario of EIoT in the case of normal flow of traffic is simulated, containing all 121 normal nodes. Therefore, traffic of the network flows normally without any problem.
  • Scenario of sinkhole attack: The scenario of EIoT under sinkhole attack is further simulated which consists of 20 % attacker nodes i.e., 24 IoT sensor nodes becomes S H A s. Remaining nodes are normal nodes out of 121. The 24 attacker nodes contain various types of nodes like the “sinkhole attacker nodes which drop the packets”, “sinkhole nodes which delay the messages”, “sinkhole nodes which modify the messages” and “sinkhole nodes which selectively forward the messages”.
  • Scenario of SAD-EIoT: The EIoT scenario under sinkhole attack along with the implementation of SAD-EIoT is further simulated. For the detection of S H A s, each edge node transmits and receives various types of messages in EIoT. After performing the detection process E N j blacklists all detected S H A s and also informs other legitimate IoT sensor nodes through alert (information) messages.

6.3. Discussion on Simulation Results

In this part of the paper, the following statistics for SAD-EIoT are accomplished: (i) packet delivery ratio, (ii) end-to-end delay (in seconds), (iii) “throughput” (in bps), (iv) packet loss rate, (v) “detection rate ( D R ) ”, (vi) “false positive rate ( F P R ) ”.

6.3.1. Effect on Packet Delivery Ratio

The packet delivery ratio is formulated as “the ratio of packets received at the base station to packets transmitted by source nodes” (for example, from S i to E N j ). Table 4 provides packet delivery ratio in different instances, such as normal flow of traffic, under sinkhole attack and “under deployed SAD-EIoT”. From Table 4 and Figure 10, it is confirmed that the packet delivery ratio for the instances under normal flow of traffic, under sinkhole attack and “under SAD-EIoT” are 0.81 , 0.29 and 0.77 , respectively. Thus, it is observed that the packet delivery ratio is indubitably improved under the deployment of “SAD-EIoT” as compared to the case of sinkhole attack.

6.3.2. Effect on Packet Loss Rate

The packet loss rate is also one of the important network parameters. It is estimated as the “number of packets lost per unit time”. It is required that for a reliable communication of the network, the packet loss rate should be as least as possible. Table 4 and Figure 11 show that the packet loss rate (packets per second p p s ), under normal flow of traffic, under sinkhole attack and “under SAD-EIoT” are 0.005 , 0.012 and 0.006 , respectively. Thus, it is observed that the packet loss rate is indubitably reduced under the deployment of “SAD-EIoT” as compared to the case of sinkhole attack.

6.3.3. Effect on End-to-End Delay

The end-to-end delay is estimated as “the average time taken by the data packets to arrive at the base station, for example, E N j from S i ”. Table 4 represents the “end-to-end delay (in seconds)”, under normal flow of traffic, under sinkhole attack and “under the deployment of SAD-EIoT”. Table 4 and Figure 12 confirm that the end-to-end delay, under normal flow of traffic, under sinkhole attack and “under SAD-EIoT” are 0.72803 , 0.80338 and 0.74485 , respectively. Thus, it is cleared that the end-to-end delay is indubitably reduced under the deployment of “SAD-EIoT” as compared to the case of sinkhole attack.

6.3.4. Effect on Throughput

Throughput is “the number of bits transferred per unit time”. Table 4 represents the throughput (in bps), under normal flow of traffic, under sinkhole attack and “under the deployment of SAD-EIoT”. From Table 4 and Figure 13, it is confirmed that the “throughput”, under normal flow of traffic, under sinkhole attack and “under SAD-EIoT” are 12.48 , 2.88 and 11.84 , respectively. Thus it is observed that the end-to-end delay is indubitably improved under the deployment of “SAD-EIoT” as compared to the case of sinkhole attack.
The diverse statistics of SAD-EIoT as per the various scenarios are provided in Table 4.

6.3.5. Effect on Detection Rate and False Positive Rate

The other essential performance parameter of an IDS is the D R (which is also known as “true positive rate ( T P R ) or sensitivity or hit rate” or “false positive rate or fall out ( F P R ) ”). It is very essential to consider this parameter in the evaluation of performance of a proposed intrusion detection scheme. D R can be estimated as “the number of attackers detected by an IDS divided by the total number of attackers present in the test sample” which is formulated as
D R = T P T P + F N ,
whereas F P R is estimated as “the number of nodes falsely detected as attacker nodes” which is formulated as
F P R = F P T N + F P .
The obtained results are briefed as follows:
  • A confusion matrix of the obtained results is constructed and its details are provided in Table 5. The provided matrix clears that SAD-EIoT detects 23 S H A s.
    Thus, there is a total of 23 T P nodes (actual attackers), one F P node (normal nodes), 96 T N nodes (normal nodes) and one F N node (actually an attacker but identified as a normal node).
  • There are in total 24 S H A s and 81 normal nodes. Accordingly, D R and F P R are 95.83 % and 1.03 % respectively.

7. Comparative Analysis of SAD-EIoT with Other Related Existing Schemes

In this part of the paper, the results of SAD-EIoT are compared with other closely related schemes proposed by Salehi et al. [31], Wang et al. [32], Wang et al. [33], Wang et al. [34], Wazid et al. [17] and Wazid et al. [18]. The comparative analysis of outcomes is presented in Table 6. The following observations have been made:
  • The D R for Salehi et al.’s scheme [31], Wang et al.’s scheme [32], Wang et al.’s scheme [33], Wang et al.’s scheme [34], Wazid et al.’s scheme [17], Wazid et al.’s scheme [18] and SAD-EIoT are 93.00, 90.96, 86.00, 83.00, 95.00, 95.00 and 95.83, respectively.
  • The “false positive rate (FPR)” for Salehi et al.’s scheme [31], Wang et al.’s scheme [32], Wazid et al.’s scheme [17], Wazid et al.’s scheme [18] and SAD-EIoT is 10.00, 2.06, 1.25, 1.23 and 1.03, respectively.
Therefore, the designed SAD-EIoT performs better than other related existing schemes.
The comparison of computational complexities of existing schemes and SAD-EIoT is provided in Table 7. The computational complexities for the schemes of Salehi et al. [31], Wang et al. [32], Wang et al. [33], Wang et al. [34], Wazid et al. [17], Wazid et al. [18] and SAD-EIoT are O ( n 2 ) , O ( n 2 ) , O ( n 2 ) , O ( n 2 ) , O ( n 2 ) , O ( n 2 ) and O ( n ) respectively. Here, n denotes the total number of deployed IoT sensing nodes or sensor nodes in the specified area. The complexities for other existing schemes are quadratic whereas for SAD-EIoT they are linear. Hence, SAD-EIoT performed better in terms of computational costs.

8. Concluding Remarks

As discussed in this work, the performance of edge-based IoT communication degrades very rapidly under the presence of various sinkhole attacker nodes ( S H A s). Most of the existing schemes for sinkhole node detection are not effective as they cannot identify all possible types of S H A s in EIoT. Moreover, the existing intrusion detection schemes have other limitations, such as inefficiency in terms of communication and computation costs. To overcome this problem, an efficient intrusion detection scheme for the detection of various kinds of S H A s in EIoT (SAD-EIoT) is proposed. SAD-EIoT requires a lower number of exchanged messages that further causes reduction in overall communication cost. Furthermore, SAD-EIoT achieves around 95.83 % detection rate and 1.03 % false positive rate, which is considerably better than other related existing schemes. The performed security analysis also confirms the resilience of SAD-EIoT against sinkhole attack. Apart from these characteristics, in SAD-EIoT, the resource-constrained IoT devices (sensors) need less computation and communication costs because the resource-rich edge node only executes the steps of S H A s detection algorithm. Eventually, SAD-EIoT will be a suitable match for those applications which can be used in critical and sensitive operations (for example, surveillance, security and monitoring systems).
In the future, a testbed for the proposed SAD-EIoT scheme along with detection of a greater number of attacks, such as blackhole, greyhole, wormhole and other routing attacks in IoT environment can be implemented and analysed.

Author Contributions

All the authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (2017R1A2B1002147), in part by FCT/MCTES through national funds and when applicable cofunded EU funds under the project UIDB/EEA/50008/2020 and in part by Brazilian National Council for Scientific and Technological Development (CNPq) via Grant No. 309335/2017-5.

Acknowledgments

We thank the anonymous reviewers and the editor for their valuable comments, which helped us to improve the quality and presentation of the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Challa, S.; Wazid, M.; Das, A.K.; Kumar, N.; Reddy, A.G.; Yoon, E.; Yoo, K. Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications. IEEE Access 2017, 5, 3028–3043. [Google Scholar] [CrossRef]
  2. Gubbi, J.; Buyya, R.; Marusic, S.; Palaniswami, M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2013, 29, 1645–1660. [Google Scholar] [CrossRef] [Green Version]
  3. Esposito, C.; Castiglione, A.; Pop, F.; Choo, K.K.R. Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective. IEEE Cloud Comput. 2017, 4, 13–17. [Google Scholar] [CrossRef]
  4. Sheth, A. Internet of Things to Smart IoT Through Semantic, Cognitive, and Perceptual Computing. IEEE Intell. Syst. 2016, 31, 108–112. [Google Scholar] [CrossRef]
  5. Raut, S. What Is Edge Computing? Available online: http://bigdata-madesimple.com/edge-computing/ (accessed on 18 January 2020).
  6. Marjanović, M.; Antonić, A.; Žarko, I.P. Edge Computing Architecture for Mobile Crowdsensing. IEEE Access 2018, 6, 10662–10674. [Google Scholar] [CrossRef]
  7. Stojmenovic, I.; Wen, S. The Fog computing paradigm: Scenarios and security issues. In Proceedings of the Federated Conference on Computer Science and Information Systems, Warsaw, Poland, 7–10 September 2014; pp. 1–8. [Google Scholar]
  8. Choo, K.K.R.; Rana, O.F.; Rajarajan, M. Cloud Security Engineering: Theory, Practice and Future Research. IEEE Trans. Cloud Comput. 2017, 5, 372–374. [Google Scholar] [CrossRef]
  9. Sukhov, A.; Sagatov, E.; Baskakov, A. Rank distribution for determining the threshold values of network variables and the analysis of DDoS attacks. Procedia Eng. 2017, 201, 417–427. [Google Scholar] [CrossRef]
  10. Zhao, P.; Li, J.; Zeng, F.; Xiao, F.; Wang, C.; Jiang, H. ILLIA: Enabling k-Anonymity-Based Privacy Preserving against Location Injection Attacks in Continuous LBS Queries. IEEE Internet Things J. 2018, 5, 1033–1042. [Google Scholar] [CrossRef]
  11. Wang, C.; Liu, G.; Huang, H.; Feng, W.; Peng, K.; Wang, L. MIASec: Enabling Data Indistinguishability against Membership Inference Attacks in MLaaS. IEEE Trans. Sustain. Comput. 2019. [Google Scholar] [CrossRef]
  12. Messerges, T.S.; Dabbish, E.A.; Sloan, R.H. Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 2002, 51, 541–552. [Google Scholar] [CrossRef] [Green Version]
  13. Ryoo, J.; Han, D.; Kim, S.; Lee, S. Performance Enhancement of Differential Power Analysis Attacks with Signal Companding Methods. IEEE Signal Process. Lett. 2008, 15, 625–628. [Google Scholar] [CrossRef]
  14. Rajan, A.; Jithish, J.; Sankaran, S. Sybil attack in IOT: Modelling and defenses. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI’17), Udupi, India, 13–16 September 2017; pp. 2323–2327. [Google Scholar]
  15. Zhang, K.; Liang, X.; Lu, R.; Shen, X. Sybil Attacks and Their Defenses in the Internet of Things. IEEE Internet Things J. 2014, 1, 372–383. [Google Scholar] [CrossRef]
  16. Wazid, M.; Das, A.K. A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks. Wirel. Pers. Commun. 2017, 94, 1165–1191. [Google Scholar] [CrossRef]
  17. Wazid, M.; Das, A.K.; Kumari, S.; Khan, M.K. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks. Secur. Commun. Networks 2016, 9, 4596–4614. [Google Scholar] [CrossRef]
  18. Wazid, M.; Reshma Dsouza, P.; Das, A.K.; Bhat K, V.; Kumar, N.; Rodrigues, J.J.P.C. RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment. Int. J. Commun. Syst. 2019, 32, e4024. [Google Scholar] [CrossRef]
  19. Dong, D.; Li, M.; Liu, Y.; Li, X.; Liao, X. Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks. IEEE/ACM Trans. Netw. 2011, 19, 1787–1796. [Google Scholar] [CrossRef] [Green Version]
  20. Hamedheidari, S.; Rafeh, R. A novel agent-based approach to detect sinkhole attacks in wireless sensor networks. Comput. Secur. 2013, 37, 1–14. [Google Scholar] [CrossRef]
  21. Ngai, E.C.H.; Liu, J.; Lyu, M.R. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Comput. Commun. 2007, 30, 2353–2364. [Google Scholar] [CrossRef]
  22. Shafiei, H.; Khonsari, A.; Derakhshi, H.; Mousavi, P. Detection and mitigation of sinkhole attacks in wireless sensor networks. J. Comput. Syst. Sci. 2014, 80, 644–653. [Google Scholar] [CrossRef]
  23. Wazid, M.; Katal, A.; Sachan, R.S.; Goudar, R.H.; Singh, D.P. Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network. In Proceedings of the IEEE International Conference on Communications and Signal Processing (ICCSP’13), Melmaruvathur, India, 3–5 April 2013; pp. 576–581. [Google Scholar]
  24. Wazid, M.; Das, A.K. An Efficient Hybrid Anomaly Detection Scheme Using K-Means Clustering for Wireless Sensor Networks. Wirel. Pers. Commun. 2016, 90, 1971–2000. [Google Scholar] [CrossRef]
  25. Chatterjee, S.; Das, A.K. An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Netw. 2015, 8, 1752–1771. [Google Scholar] [CrossRef]
  26. Das, A.K. A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-To-Peer Netw. Appl. 2016, 9, 223–244. [Google Scholar] [CrossRef]
  27. Das, A.K. A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 2017, 30, 1–25. [Google Scholar] [CrossRef]
  28. Das, A.K. A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol for Large-Scale Distributed Wireless Sensor Networks. Wirel. Pers. Commun. 2015, 82, 1377–1404. [Google Scholar] [CrossRef]
  29. Dolev, D.; Yao, A.C. On the security of public key protocols. IEEE Trans. Inf. Theory 1983, 29, 198–208. [Google Scholar] [CrossRef]
  30. Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1086–1090. [Google Scholar] [CrossRef]
  31. Salehi, S.A.; Razzaque, M.A.; Naraei, P.; Farrokhtala, A. Detection of sinkhole attack in wireless sensor networks. In Proceedings of the IEEE International Conference on Space Science and Communication (IconSpace’13), Melaka, Malaysia, 1–3 July 2013; pp. 361–365. [Google Scholar]
  32. Wang, S.S.; Yan, K.Q.; Wang, S.C.; Liu, C.W. An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks. Expert Syst. Appl. 2011, 38, 15234–15243. [Google Scholar] [CrossRef]
  33. Wang, Y.; Fu, W.; Agrawal, D.P. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 342–355. [Google Scholar] [CrossRef]
  34. Wang, Y.; Wang, X.; Xie, B.; Wang, D.; Agrawal, D.P. Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2008, 7, 698–711. [Google Scholar] [CrossRef]
  35. Zhan, G.; Shi, W.; Deng, J. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. IEEE Trans. Dependable Secur. Comput. 2012, 9, 184–197. [Google Scholar] [CrossRef]
  36. Shin, S.; Kwon, T.; Jo, G.; Park, Y.; Rhy, H. An Experimental Study of Hierarchical Intrusion Detection for Wireless Industrial Sensor Networks. IEEE Trans. Ind. Inform. 2010, 6, 744–757. [Google Scholar] [CrossRef]
  37. Yu, Y.; Li, K.; Zhou, W.; Li, P. Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures. J. Netw. Comput. Appl. 2012, 35, 867–880. [Google Scholar] [CrossRef]
  38. Liu, Y.; Ma, M.; Liu, X.; Xiong, N.; Liu, A.; Zhu, Y. Design and Analysis of Probing Route to Defense Sink-hole Attacks for Internet of Things Security. IEEE Trans. Netw. Sci. Eng. 2018. [Google Scholar] [CrossRef]
  39. Chen, H.; Meng, C.; Shan, Z.; Fu, Z.; Bhargava, B.K. A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation. IEEE Access 2019, 7, 32853–32866. [Google Scholar] [CrossRef]
  40. Fang, W.; Xu, M.; Zhu, C.; Han, W.; Zhang, W.; Rodrigues, J.J.P.C. FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access 2019, 7, 13476–13485. [Google Scholar] [CrossRef]
  41. Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the International Conference on Pervasive Computing (ICPC’15), Pune, India, 8–10 January 2015; pp. 1–6. [Google Scholar]
  42. Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
  43. Lyu, C.; Zhang, X.; Liu, Z.; Chi, C. Selective Authentication Based Geographic Opportunistic Routing in Wireless Sensor Networks for Internet of Things Against DoS Attacks. IEEE Access 2019, 7, 31068–31082. [Google Scholar] [CrossRef]
  44. He, Y.; Han, G.; Wang, H.; Ansere, J.A.; Zhang, W. A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things. Future Gener. Comput. Syst. 2019, 96, 438–448. [Google Scholar] [CrossRef]
  45. Airehrour, D.; Gutierrez, J.A.; Ray, S.K. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Gener. Comput. Syst. 2019, 93, 860–876. [Google Scholar] [CrossRef]
  46. Sicari, S.; Rizzardi, A.; Miorandi, D.; Coen-Porisini, A. REATO: REActing TO Denial of Service attacks in the Internet of Things. Comput. Netw. 2018, 137, 37–48. [Google Scholar] [CrossRef]
  47. Deshmukh-Bhosale, S.; Sonavane, S.S. A Real-Time Intrusion Detection System for Wormhole Attack in the RPL based Internet of Things. Procedia Manuf. 2019, 32, 840–847. [Google Scholar] [CrossRef]
  48. Liu, G.; Quan, W.; Cheng, N.; Zhang, H.; Yu, S. Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things. J. Netw. Comput. Appl. 2019, 130, 1–13. [Google Scholar] [CrossRef]
  49. Raoof, A.; Matrawy, A.; Lung, C. Routing Attacks and Mitigation Methods for RPL-Based Internet of Things. IEEE Commun. Surv. Tutor. 2019, 21, 1582–1606. [Google Scholar] [CrossRef]
  50. Mayzaud, A.; Badonnel, R.; Chrisment, I. A Distributed Monitoring Strategy for Detecting Version Number Attacks in RPL-Based Networks. IEEE Trans. Netw. Serv. Manag. 2017, 14, 472–486. [Google Scholar] [CrossRef]
  51. Cheng, Y.; Agrawal, D.P. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Netw. 2007, 5, 35–48. [Google Scholar] [CrossRef]
  52. Das, A.K. An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks. In Proceedings of the First International on Communication Systems and Networks and Workshops (COMSNETS 2009), Bangalore, India, 5–10 January 2009; pp. 1–10. [Google Scholar]
  53. Das, A.K.; Sharma, P.; Chatterjee, S.; Sing, J.K. A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 2012, 35, 1646–1656. [Google Scholar] [CrossRef]
  54. Das, A.K. An efficient random key distribution scheme for large-scale distributed sensor networks. Secur. Commun. Netw. 2011, 4, 162–180. [Google Scholar] [CrossRef]
  55. Wang, J.; Dong, W.; Cao, Z.; Liu, Y. On the Delay Performance in a Large-Scale Wireless Sensor Network: Measurement, Analysis, and Implications. IEEE/ACM Trans. Netw. 2015, 23, 186–197. [Google Scholar] [CrossRef]
  56. Secure Hash Standard. FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995. 1995. Available online: http://csrc.nist.gov/publications/fips/fips180-4/fips-180-4.pdf (accessed on 18 January 2020).
  57. Farsi, M.; Badawy, M.; Moustafa, M.; Arafat Ali, H.; Abdulazeem, Y. A Congestion-Aware Clustering and Routing (CCR) Protocol for Mitigating Congestion in WSN. IEEE Access 2019, 7, 105402–105419. [Google Scholar] [CrossRef]
  58. Ren, J.; Zhang, Y.; Zhang, K.; Shen, X. Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2016, 15, 3718–3731. [Google Scholar] [CrossRef]
  59. Ren, K.; Lou, W.; Zhang, Y. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2008, 7, 585–598. [Google Scholar] [CrossRef]
  60. Ghazvini, M.; Vahabi, M.; Rasid, M.; Abdullah, R.; Musa, W. Low Energy Consumption MAC Protocol for Wireless Sensor Networks. In Proceedings of the IEEE 2nd International Conference on Sensor Technologies and Applications, Cap Esterel, France, 25–31 August 2008; pp. 49–54. [Google Scholar]
  61. Park, S.; Hong, S.W.; Lee, E.; Kim, S.H.; Crespi, N. Large-scale mobile phenomena monitoring with energy-efficiency in wireless sensor networks. Comput. Networks 2015, 81, 116–135. [Google Scholar] [CrossRef]
  62. The Network Simulator-ns-2. Available online: http://www.isi.edu/nsnam/ns/ (accessed on 18 January 2020).
  63. Perkins, C.E.; Royer, E.M. Ad-hoc on-demand distance vector routing. In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’99), New Orleans, LA, USA, 25–26 February 1999; pp. 90–100. [Google Scholar]
Figure 1. Generic Internet of Things (IoT) architecture (adapted from [1]).
Figure 1. Generic Internet of Things (IoT) architecture (adapted from [1]).
Sensors 20 01300 g001
Figure 2. Edge-based IoT architecture for smart home scenario.
Figure 2. Edge-based IoT architecture for smart home scenario.
Sensors 20 01300 g002
Figure 3. Edge-based Internet of Things (IoT) environment (EIoT)-communication under the normal flow of traffic.
Figure 3. Edge-based Internet of Things (IoT) environment (EIoT)-communication under the normal flow of traffic.
Sensors 20 01300 g003
Figure 4. EIoT-communication in the case of sinkhole attack.
Figure 4. EIoT-communication in the case of sinkhole attack.
Sensors 20 01300 g004
Figure 5. Sequence diagram of sinkhole attack detection through SAD-EIoT.
Figure 5. Sequence diagram of sinkhole attack detection through SAD-EIoT.
Sensors 20 01300 g005
Figure 6. Assembly of status and data query message ( μ s d q ) .
Figure 6. Assembly of status and data query message ( μ s d q ) .
Sensors 20 01300 g006
Figure 7. Structure of status response message μ s r .
Figure 7. Structure of status response message μ s r .
Sensors 20 01300 g007
Figure 8. Assembly of data message μ d .
Figure 8. Assembly of data message μ d .
Sensors 20 01300 g008
Figure 9. Structure of information message ( μ i n ) .
Figure 9. Structure of information message ( μ i n ) .
Sensors 20 01300 g009
Figure 10. Comparison of packet delivery ratios.
Figure 10. Comparison of packet delivery ratios.
Sensors 20 01300 g010
Figure 11. Comparison of packet loss rates.
Figure 11. Comparison of packet loss rates.
Sensors 20 01300 g011
Figure 12. Comparison of end-to-end delays.
Figure 12. Comparison of end-to-end delays.
Sensors 20 01300 g012
Figure 13. Comparison of throughput.
Figure 13. Comparison of throughput.
Sensors 20 01300 g013
Table 1. Comparison of existing techniques.
Table 1. Comparison of existing techniques.
ProtocolGoalMethod UsedOutcomes and Limitations
Wang et al. [34]Intrusion detectionSingle and multi sensing detection methodsPerformed intrusion detection with low detection rate
Wang et al. [32]Intrusion detectionMisuse based IDS methodPerformed intrusion detection with low detection rate along with high computational cost
Wang et al. [33]Intrusion detectionGaussian and uniformly distributed methodPerformed intrusion detection with low detection rate (in the case of lower number of nodes)
Salehi et al. [31]Intrusion detectionInformation flow based detectionPerformed intrusion detection with high false positive rate
Wazid et al. [17]Sinkhole node detection in WSNCluster based sinkhole node detectionPerformed sinkhole node detection with high computation cost
Wazid et al. [18]Routing attack detection in IoTRAD-EIPerformed routing attack detection with high computation cost
Table 2. Notations utilised in SAD-EIoT.
Table 2. Notations utilised in SAD-EIoT.
SymbolDescription
E N j jth edge node
S i ith IoT smart device (sensor node)
S H A k kth sinkhole attacker node
l List of suspected S H A s
S H A l i s t List of S H A s
I D S i , I D E N j Identities of S i and E N j , respectively
S K E N j , S i Shared secret key between E N j and S i
R E N S i Energy remaining value at an IoT sensor S i
R S i Rank of an IoT sensor S i
R L S i , R U S i Lowest and highest values of ranks of S i , respectively
H C S i Hop count for S i from E N j
H C θ Threshold value of hop count for the network
μ s d q , μ s r Messages containing status & data query and status response, respectively
μ d , μ i n Messages containing only data and information, respectively
s d q r q , s r p Information contents in messages μ s d q and μ s r , respectively
d a t a Message μ d ’s data content
W T W T θ Waiting time and its threshold at E N j , respectively
P D n , P D a , P D s Packet delivery ratios under normal circumstance of traffic,
attack condition and under SAD-EIoT, respectively
D R Detection rate/true positive rate ( T P R )
F P R False positive rate
T P , F P True and false positives, respectively
T N , F N True and false negatives, respectively
ν n , ν a , ν s End-to-end delay (in seconds) in normal condition,
attack condition and under SAD-EIoT cases, respectively
Λ n , Λ a , Λ s Throughput in bits per second ( b p s ) in normal condition,
attack condition and under SAD-EIoT cases, respectively
| μ d | “Total data packets transmitted by IoT sensing devices”
| μ d | “Total confirmed data packets received at E N j
| μ d p a | “Total data packets that are not transmitted to edge node” by attacker nodes
| μ d p a | “Total data packets that are not transmitted to edge node” by authentic attacker nodes ( T P )
| μ d 1 | “Total data packets that are not transmitted to edge node” by attacker nodes ( F N )
μ i n “Information message transmitted by each E N j ” to all regular IoT sensing nodes
T s e n d i , T r e c i “Sending and receiving time” of a data packet, say i, respectively
h ( · ) “One-way collision-resistant cryptographic hash function”
pTotal packets
p k t , p k t s A data packet and its corresponding size
Hashed message authentication code (HMAC)
X | | Y Concatenation of data X with data Y
Table 3. Parameters used in simulations.
Table 3. Parameters used in simulations.
ParameterDescription
PlatformUbuntu 18.04 LTS
Network area 650 × 250 m 2
Number of nodes121 nodes
Number of attacker nodes24
Time considered for simulations1800 s
Traffic typeCBR/UDP
Packet transmission rate25 Kbps
IoT device’s communication range100 m
Table 4. Obtained statistics of EIoT for different cases.
Table 4. Obtained statistics of EIoT for different cases.
ParameterCase of Normal FlowCase of SinkholeUnder the Deployment
of TrafficAttackof SAD-EIoT
Packet delivery ratio0.810.290.77
Packet loss rate (in pps)0.0050.0120.006
End-to-end delay (in seconds)0.728030.803380.74485
Throughput (in bps)12.482.8811.84
Table 5. Confusion matrix for SAD-EIoT.
Table 5. Confusion matrix for SAD-EIoT.
Actual Value
Predicted value PositivesNegatives
PositivesTP: 23FP: 01
NegativesFN: 01TN: 96
Table 6. Accuracy comparison among existing schemes and SAD-EIoT.
Table 6. Accuracy comparison among existing schemes and SAD-EIoT.
Scheme[31][32][33][34][17][18]SAD-EIoT
“Detection rate (DR) (in %)”93.0090.9686.0083.0095.0095.0095.83
“False positive rate (FPR) (in %)”10.002.06N/AN/A1.251.231.03
Note: N/A: not available.
Table 7. Comparison of computational complexity among existing schemes and SAD-EIoT.
Table 7. Comparison of computational complexity among existing schemes and SAD-EIoT.
Scheme[31][32][33][34][17][18]SAD-EIoT
Computational complexity O ( n 2 ) O ( n 2 ) O ( n 2 ) O ( n 2 ) O ( n 2 ) O ( n 2 ) O ( n )
Note: N/A: not available.

Share and Cite

MDPI and ACS Style

Pundir, S.; Wazid, M.; Singh, D.P.; Das, A.K.; J. P. C. Rodrigues, J.; Park, Y. Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors 2020, 20, 1300. https://doi.org/10.3390/s20051300

AMA Style

Pundir S, Wazid M, Singh DP, Das AK, J. P. C. Rodrigues J, Park Y. Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors. 2020; 20(5):1300. https://doi.org/10.3390/s20051300

Chicago/Turabian Style

Pundir, Sumit, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Joel J. P. C. Rodrigues, and Youngho Park. 2020. "Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment" Sensors 20, no. 5: 1300. https://doi.org/10.3390/s20051300

APA Style

Pundir, S., Wazid, M., Singh, D. P., Das, A. K., J. P. C. Rodrigues, J., & Park, Y. (2020). Designing Efficient Sinkhole Attack Detection Mechanism in Edge-Based IoT Deployment. Sensors, 20(5), 1300. https://doi.org/10.3390/s20051300

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop