EconPapers    
Economics at your fingertips  
 

Development of a Model for Spoofing Attacks in Internet of Things

Faheem Khan (), Abdullah A. Al-Atawi, Abdullah Alomari, Amjad Alsirhani, Mohammed Mujib Alshahrani, Jawad Khan and Youngmoon Lee ()
Additional contact information
Faheem Khan: Department of Computer Engineering, Gachon University, Seongnam 13120, Korea
Abdullah A. Al-Atawi: Department of Computer Science, Applied College, University of Tabuk, Tabuk 47512, Saudi Arabia
Abdullah Alomari: Department of Computer Science, Al-Baha University, Albaha 65799, Saudi Arabia
Amjad Alsirhani: College of Computer and Information Sciences, Jouf University, Sakaka 72388, Saudi Arabia
Mohammed Mujib Alshahrani: College of Computing and Information Technology, University of Bisha, Bisha 61361, Saudi Arabia
Jawad Khan: Department of Robotics, Hanyang University, Ansan 15588, Korea
Youngmoon Lee: Department of Robotics, Hanyang University, Ansan 15588, Korea

Mathematics, 2022, vol. 10, issue 19, 1-16

Abstract: Internet of Things (IoT) allows the integration of the physical world with network devices for proper privacy and security in a healthcare system. IoT in a healthcare system is vulnerable to spoofing attacks that can easily represent themselves as a legal entity of the network. It is a passive attack and can access the Medium Access Control address of some valid users in the network to continue malicious activities. In this paper, an algorithm is proposed for detecting spoofing attacks in IoT using Received Signal Strength (RSS) and Number of Connected Neighbors (NCN). Firstly, the spoofing attack is detected, located and eliminated through Received Signal Strength (RSS) in an inter-cluster network. However, the RSS is not useful against intra-cluster spoofing attacks and therefore the NCN is introduced to detect, identify and eliminate the intra-cluster spoofing attack. The proposed model is implemented in Network Simulator 2 (NS-2) to compare the performance of the proposed algorithm in the presence and absence of spoofing attacks. The result is that the proposed model increases the detection and prevention of spoofing.

Keywords: spoofing attack; IoT; RSS; NCN; healthcare system; NS-2 simulator (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations: View citations in EconPapers (2)

Downloads: (external link)
https://www.mdpi.com/2227-7390/10/19/3686/pdf (application/pdf)
https://www.mdpi.com/2227-7390/10/19/3686/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:10:y:2022:i:19:p:3686-:d:936609

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jmathe:v:10:y:2022:i:19:p:3686-:d:936609