MODEL FOR MITIGATING PASSIVE EAVESDROPPING ATTACK IN IOT

Show simple item record

dc.contributor.author Shorubiga, P.
dc.contributor.author Kartheeswaran, T.
dc.date.accessioned 2022-08-22T11:43:42Z
dc.date.available 2022-08-22T11:43:42Z
dc.date.issued 2020-12-02
dc.identifier.uri http://drr.vau.ac.lk/handle/123456789/359
dc.description.abstract The passive eavesdropping attack on the Internet of Things has serious risks on the user’s data privacy. The security of IoT is still an unresolved question. Soon the people all over the world adopt IoT as smart home applications, wearables, and Industrial automation too. The risks in the confidentiality of private data are raising the number of devices and data exchanged. Even though the data having various light-weight encryption practices, the attackers still have a way to invade the confidentiality of the data. Metadata information in the packet header such as the size of the packet, protocol type, MAC address of source and destination, and state of the device can be exploited in a way that the attacker can be able to understand the user activities in a particular device. Application of deep packet inspection method and machine learning to huge data packets of a targeted user can reveal a lot of personal information. In this study, we propose a model to protect the header information. Speck, a lightweight encryption algorithm is used to encrypting the metadata such as MAC addresses of the source and destination. Because the MAC address reveals the device type and services to the attacker. The Software-Defined Network is chosen to be the central control for packets transmission to overcome the anonymity of packet flow. The decoupling mechanism of the control plane and the forwarding plane, the controller directs the encrypted packets to the routers and switches as a secured third party. The model was simulated using the RYU controller and tested in the Mininet SDN emulation platform using 4 nodes and respective connecting Ovsk switches with the central controller. The model has been validated using the packet capturing process with Wireshark. en_US
dc.language.iso en en_US
dc.publisher Faculty of Applied Science en_US
dc.source.uri http://www.vau.jfn.ac.lk/fars2020/ en_US
dc.subject Information privacy en_US
dc.subject Eavesdropping attack en_US
dc.subject Internet of things en_US
dc.subject Confidentiality en_US
dc.subject Packet header en_US
dc.subject Software defined networking en_US
dc.subject MAC address en_US
dc.title MODEL FOR MITIGATING PASSIVE EAVESDROPPING ATTACK IN IOT en_US
dc.type Conference paper en_US
dc.identifier.proceedings Conference Proceedings, First Annual Research Session – 2020 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search


Browse

My Account