<?xml version="1.0" encoding="UTF-8"?>
<record>
  <title>An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT</title>
  <journal>Journal of Information Security Research</journal>
  <author>Atena Shiranzaei, Rafiqul Zaman Khan</author>
  <volume>9</volume>
  <issue>3</issue>
  <year>2018</year>
  <doi>https://doi.org/10.6025/jisr/2018/9/3/107-118</doi>
  <url>http://www.dline.info/jisr/fulltext/v9n3/jisrv9n3_3.pdf</url>
  <abstract>Internet of things (IoT) is considered as a new technology to connect the resource-constrained things to the
unreliable and untrusted world of the Internet through IPv6 and 6LowPAN network. The things are exposed wireless attacks
from inside or outside the network. To prevent against these attacks, the existence of Intrusion Detection Systems (IDS) are
necessary. In this paper, we design, implement, and evaluate our IDS. We implement the IDS in Contiki OS and evaluate it. The
result of the evaluation shows the positive rate of IDS is 100% when the the malicious node is in the range of the IPv6 Border
Router (6BR). We challenged our IDS in divergent position of the malicious node. However, the true positive rate depends on
the position of the malicious node on the network.</abstract>
</record>
