Operational message
There are currently operational disruptions. Troubleshooting is in progress.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
SVELTE: Real-time Intrusion Detection in the Internet of Things
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0001-8192-0893
RISE, Swedish ICT, SICS.
RISE, Swedish ICT, SICS, Computer Systems Laboratory. Uppsala University, Sweden.ORCID iD: 0000-0002-2586-8573
2013 (English)In: Ad Hoc Networks (Elsevier), Vol. 11, no 8, p. 2661-2674Article in journal (Refereed) Published
Abstract [en]

In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. Currently, there are no IDSs that meet the requirements of the IPv6-connected IoT since the available approaches are either customized for Wireless Sensor Networks (WSN) or for the conventional Internet. In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE. In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding. However, our approach can be extended to detect other attacks. We implement SVELTE in the Contiki OS and thoroughly evaluate it. Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks. However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes. Also, SVELTE's overhead is small enough to deploy it on constrained nodes with limited energy and memory capacity.

Place, publisher, year, edition, pages
2013, 7. Vol. 11, no 8, p. 2661-2674
Keywords [en]
6LoWPAN, Internet of Things, Intrusion detection, IPv6, RPL, Security, Sensor networks
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-24249DOI: 10.1016/j.adhoc.2013.04.014Scopus ID: 2-s2.0-84885328301OAI: oai:DiVA.org:ri-24249DiVA, id: diva2:1043329
Projects
CALIPSOPromosCNSAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2025-09-23Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Raza, ShahidVoigt, Thiemo

Search in DiVA

By author/editor
Raza, ShahidVoigt, Thiemo
By organisation
Security LabSICSComputer Systems Laboratory
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 167 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf