Information Security and Computer Fraud
ISSN (Print): 2376-9602 ISSN (Online): 2376-9629 Website: http://www.sciepub.com/journal/iscf Editor-in-chief: Sergii Kavun
Open Access
Journal Browser
Go
Information Security and Computer Fraud. 2019, 7(1), 1-6
DOI: 10.12691/iscf-7-1-1
Open AccessArticle

Lightweight Man-In-The-Middle (MITM) Detection and Defense Algorithm for WiFi-Enabled Internet of Things (IoT) Gateways

Justice Owusu Agyemang1, Jerry John Kponyo1, and Isaac Acquah1

1Faculty of Electrical/Computer Engineering, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana

Pub. Date: January 14, 2019

Cite this paper:
Justice Owusu Agyemang, Jerry John Kponyo and Isaac Acquah. Lightweight Man-In-The-Middle (MITM) Detection and Defense Algorithm for WiFi-Enabled Internet of Things (IoT) Gateways. Information Security and Computer Fraud. 2019; 7(1):1-6. doi: 10.12691/iscf-7-1-1

Abstract

Man-In-The-Middle (MITM) attack is one of the well-known threats in computer security. With the convergence of smart objects and the Internet (Internet of Things), there has been the need to ensure confidentiality, integrity and availability of information. MITM targets the data flow between endpoints, and the confidentiality and integrity of the data itself. In this paper, we present a lightweight and real-time MITM detection and defense algorithm that can be implemented on WiFi-enabled IoT gateways. The algorithm works for statically assigned host IP addresses and also IP addresses assigned via DHCP. We employed Asynchronous Method Dispatch (AMD) to reduce performance overhead. Subsequently, we evaluated the performance of the algorithm with respect to CPU utilization, detection rate and network latency.

Keywords:
IoT MITM IDS DoS AP EAPOL ARP DHCP

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Dave Evans, The Internet of Things: How the Next Evolution of the Internet is Changing Everything, Cisco Internet Business Solutions Group (IBSG), pp. 3, April 2011.
 
[2]  Garcia-Morchon O. Kumar S., Struik R., Keoh S., Hummen R., Security considerations in the IP-based Internet of Things, IETF Internet-Draft, 2013.
 
[3]  Notra S., Siddiqi M., Gharakheili H., Sivaraman V., Boreli R., An Experimental Study of Security and Privacy Risks with Emerging Household Appliances, In: Communications and Network Security (CNS), 2014 IEEE Conference on, pp. 79-84, 2014.
 
[4]  Kolias C., Stavrou A., Voas J., Bojanova I., Kuhn R., Learning Internet -of-things Security “Hands-on”. IEEE Secur. Priv. 20 (February), 2-11.
 
[5]  Plummer, D. C. (1982), An Ethernet Address Resolution Protocol. RFC 826.
 
[6]  AI Sukkar G., Saifan R., Khwaldeh S., Maqableh M., Jafar L., Address Resolution Protocol (ARP); Spoofing Attack and Proposed Defense, Communications and Network, 8, 118-130, 2016.
 
[7]  Mauro Conti, Nicola Dragoni, Viktor Lesyk, A Survey of Man In the Middle Attacks, IEEE Communications Surveys & Tutorials, Vol. 18, No. 3, 2016.
 
[8]  J. Belenguer, C. T. Calafate, A low-cost Embedded IDS to Monitor and Prevent Man-In-The-Middle Attacks on Wired LAN Environments, Proc. Int. Conf. SecureWave Emerging Secur. Inf. Sys. Technol., 2007, pp. 122-127.
 
[9]  Isaac B., Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks, International Journal of Network Security, 8, 107-118, 2009.
 
[10]  D. Bruschi, A. Ornaghi, E. Rosti, S-ARP: A Secure Address Resolution Protocol, Proc. 19th Annu. Comput. Secur. Appl. Conf., pp. 66-74, 2003.
 
[11]  Lootah W., Enck W., McDaniel P., TARP: Ticket-Based Address Resolution Protocol, Computer Networks, 51, 4322-4337, 2007.
 
[12]  R. Philip, Securing Wireless Networks from ARP Cache Poisoning, Master’s Thesis, San Jose State University, California, 2007.
 
[13]  S. Y. Nam, D. Kim, J. Kim, Enhanced ARP: Preventing ARP Poisoning-Based Man-In-The-Middle Attacks, IEEE Commun. Lett., vol. 14, No. 2, pp. 187-189, 2010.
 
[14]  S. Y. Nam, S. Jurayev, S.-S. Kim, K. Choi, G. S. Choi, Mitigating ARP Poisoning-Based Man-In-The-Middle Attacks in Wired or Wirelesss LAN, EURASIP Journal on Wireless Communications and Networking. 2012.
 
[15]  S. Y. Nam, S. Djuraev, M. Park, Collaborative Approach to Mitigate ARP Poisoning-Based Man-In-The-Middle Attack, Comput. Netw. Vol 58, No. 18, pp 3866-3884, 2013.
 
[16]  Bruno Bogaz Zarpelao, Rodrigo Sanches Miani, Caludio Toshio Kawakani, Sean Carlisto de Alvarenga, A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, pp 2-4, 2017.
 
[17]  Raspberry Pi, https://www.raspberrypi.org/products/raspberry-pi-3-model-b/, [Accessed Dec 11, 2018].
 
[18]  NodeMcu, http://www.nodemcu.com/index_en.html, [Accessed Dec 22, 2018].
 
[19]  IoT IDS, https://github.com/jayluxferro/IoT-IDS/.