{rfName}
Hy

Indexed in

License and use

Altmetrics

Analysis of institutional authors

Trujillo-Rasua RAuthor

Share

March 14, 2023
Publications
>
Proceedings Paper
No

Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks

Publicated to:2019 29th International Telecommunication Networks And Applications Conference, Itnac 2019. - 2019-11-01 (), DOI: 10.1109/ITNAC46935.2019.9077977

Authors: Kang, James Jin; Fahd, Kiran; Venkatraman, Sitalakshmi; Trujillo-Rasua, Rolando; Haskell-Dowland, Paul

Affiliations

Deakin Univ, Ctr Cyber Secur Res & Innovat, Sch Informat Technol, Geelong, Vic, Australia - Author
Deakin University - Author
Edith Cowan Univ, Joondalup, WA 6027, Australia - Author
Edith Cowan University - Author
Melbourne Polytech, Preston, Vic 3072, Australia - Author
Melbourne Polytechnic - Author
See more

Abstract

Affordable and expandable low power networks such as 5G and Low Power Wide Area Networks (LPWAN) in the public and private network areas have improved network bandwidth capacities and processing performance. Internet of Things (IoT) technologies are increasing in popularity with numerous applications and devices being developed for smart environments and health-related applications. This raises security concerns in these networks, as many IoT devices handle confidential information such as IP/MAC addresses, which could be used to identify a user's location. As a result, there is vulnerability to data tampering by man-in-the-middle (MITM) attacks, which feature two observable characteristics: (1) there is a measurable delay in the session and (2) has unusual travel times compared to prior normal transactions. To improve the detection of these attacks, this paper proposes a novel scheme using a hybrid routing mechanism, which involves appointing dedicated nodes for enforcing routing between IoT devices and users with minimal intervention and workload to the network. The function of dedicated devices with more computational and battery power can provide three advantages: (1) determine secured paths within the network by avoiding suspicious nodes and networks, (2) provide stable travel times (less fluctuations) for a trusted time server (TTS) to improve the accuracy of estimated travel times, and (3) provide packet inspection for security checks. This proposed solution contributes towards increasing the security of IoT networks by enabling the real-time detection of intruders.

Keywords

areahybrid routingiot securitylow power wan (lpwan)software defined wan (sdwan)Hybrid routingIot securityLow power wan (lpwan)Man-in-the-middle (mitm) attacksProtocolsSoftware defined wan (sdwan)

Quality index

Bibliometric impact. Analysis of the contribution and dissemination channel

From a relative perspective, and based on the normalized impact indicator calculated from the Field Citation Ratio (FCR) of the Dimensions source, it yields a value of: 6.71, which indicates that, compared to works in the same discipline and in the same year of publication, it ranks as a work cited above average. (source consulted: Dimensions Jul 2025)

Specifically, and according to different indexing agencies, this work has accumulated citations as of 2025-07-18, the following number of citations:

  • WoS: 5
  • Scopus: 29

Impact and social visibility

From the perspective of influence or social adoption, and based on metrics associated with mentions and interactions provided by agencies specializing in calculating the so-called "Alternative or Social Metrics," we can highlight as of 2025-07-18:

  • The use of this contribution in bookmarks, code forks, additions to favorite lists for recurrent reading, as well as general views, indicates that someone is using the publication as a basis for their current work. This may be a notable indicator of future more formal and academic citations. This claim is supported by the result of the "Capture" indicator, which yields a total of: 43 (PlumX).

With a more dissemination-oriented intent and targeting more general audiences, we can observe other more global scores such as:

    Leadership analysis of institutional authors

    This work has been carried out with international collaboration, specifically with researchers from: Australia.