@article{2542, author = {Atena Shiranzaei, Rafiqul Zaman Khan}, title = {An Approach to Discover the Sinkhole and Selective Forwarding Attack in IoT}, journal = {Journal of Information Security Research}, year = {2018}, volume = {9}, number = {3}, doi = {https://doi.org/10.6025/jisr/2018/9/3/107-118}, url = {http://www.dline.info/jisr/fulltext/v9n3/jisrv9n3_3.pdf}, abstract = {Internet of things (IoT) is considered as a new technology to connect the resource-constrained things to the unreliable and untrusted world of the Internet through IPv6 and 6LowPAN network. The things are exposed wireless attacks from inside or outside the network. To prevent against these attacks, the existence of Intrusion Detection Systems (IDS) are necessary. In this paper, we design, implement, and evaluate our IDS. We implement the IDS in Contiki OS and evaluate it. The result of the evaluation shows the positive rate of IDS is 100% when the the malicious node is in the range of the IPv6 Border Router (6BR). We challenged our IDS in divergent position of the malicious node. However, the true positive rate depends on the position of the malicious node on the network.}, }