Skip to main content

2020 | OriginalPaper | Buchkapitel

DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks

verfasst von : Zuchao Ma, Liang Liu, Weizhi Meng

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) is growing rapidly, which allows many smart devices to connect and cooperate with each other. While for the sake of distributed architecture, an IoT environment is known to be vulnerable to insider attacks. In this work, we focus on this challenge and consider an advanced insider threat, called multiple-mix attack, which typically combines three sub-attacks: tamper attack, drop attack and replay attack. For protection, we develop a Distributed Consensus based Trust Model (DCONST), which can build the nodes’ reputation by sharing particular information, called cognition. In particular, DCONST can detect malicious nodes by using the K-Means clustering, without disturbing the normal operations of a network. In the evaluation, as compared with some similar models, DCONST can overall provide a better detection rate by increasing around 10% to 40%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Anguraj, D.K., Smys, S.: Trust-based intrusion detection and clustering approach for wireless body area networks. Wireless Pers. Commun. 104(1), 1–20 (2019)CrossRef Anguraj, D.K., Smys, S.: Trust-based intrusion detection and clustering approach for wireless body area networks. Wireless Pers. Commun. 104(1), 1–20 (2019)CrossRef
2.
Zurück zum Zitat Cho, J.H., Chen, R.: PROVEST: provenance-based trust model for delay tolerant networks. IEEE Trans. Dependable Secure Comput. 15(1), 151–165 (2016)CrossRef Cho, J.H., Chen, R.: PROVEST: provenance-based trust model for delay tolerant networks. IEEE Trans. Dependable Secure Comput. 15(1), 151–165 (2016)CrossRef
3.
Zurück zum Zitat Cho, J., Swami, A., Chen, I.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2011)CrossRef Cho, J., Swami, A., Chen, I.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2011)CrossRef
4.
Zurück zum Zitat Hongning, L., Xianjun, L., Leilei, X.: Analysis of distributed consensus-based spectrum sensing algorithm in cognitive radio networks. In: 2014 Tenth International Conference on Computational Intelligence and Security, pp. 593–597. IEEE (2014) Hongning, L., Xianjun, L., Leilei, X.: Analysis of distributed consensus-based spectrum sensing algorithm in cognitive radio networks. In: 2014 Tenth International Conference on Computational Intelligence and Security, pp. 593–597. IEEE (2014)
5.
Zurück zum Zitat Kaveri, A., Geetha, K., Kaveri, A., Geetha, K.: Enhanced secure data transmission in manet networks using consensus based and trust aware protocol. Int. J. 4, 14–25 (2018) Kaveri, A., Geetha, K., Kaveri, A., Geetha, K.: Enhanced secure data transmission in manet networks using consensus based and trust aware protocol. Int. J. 4, 14–25 (2018)
6.
Zurück zum Zitat Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 16(4), 1933–1954 (2014)CrossRef Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 16(4), 1933–1954 (2014)CrossRef
7.
Zurück zum Zitat Li, W., Meng, W., Kwok, L., Ip, H.H.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)CrossRef Li, W., Meng, W., Kwok, L., Ip, H.H.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)CrossRef
8.
Zurück zum Zitat Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 101, 865–879 (2019)CrossRef Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 101, 865–879 (2019)CrossRef
9.
Zurück zum Zitat Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018) Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018)
10.
Zurück zum Zitat Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using dual link technologies and unsupervised learning. Open J. Internet Things (OJIOT) 4(1), 109–125 (2018) Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using dual link technologies and unsupervised learning. Open J. Internet Things (OJIOT) 4(1), 109–125 (2018)
11.
Zurück zum Zitat Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015) Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)
12.
Zurück zum Zitat Mazdin, P., Arbanas, B., Haus, T., Bogdan, S., Petrovic, T., Miskovic, N.: Trust consensus protocol for heterogeneous underwater robotic systems. IFAC-PapersOnLine 49(23), 341–346 (2016)CrossRef Mazdin, P., Arbanas, B., Haus, T., Bogdan, S., Petrovic, T., Miskovic, N.: Trust consensus protocol for heterogeneous underwater robotic systems. IFAC-PapersOnLine 49(23), 341–346 (2016)CrossRef
13.
Zurück zum Zitat Meng, W.: Intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer 51(7), 36–43 (2018)CrossRef Meng, W.: Intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer 51(7), 36–43 (2018)CrossRef
14.
Zurück zum Zitat Meng, W., Choo, K.R., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(2), 761–773 (2018)CrossRef Meng, W., Choo, K.R., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(2), 761–773 (2018)CrossRef
15.
Zurück zum Zitat Meng, W., Li, W., Xiang, Y., Choo, K.K.R.: A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162–169 (2017)CrossRef Meng, W., Li, W., Xiang, Y., Choo, K.K.R.: A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162–169 (2017)CrossRef
16.
Zurück zum Zitat Nahiyan, K., Kaiser, S., Ferens, K., McLeod, R.: A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In: International Conference on Advances on Applied Cognitive Computing (ACC), pp. 25–30 (2017) Nahiyan, K., Kaiser, S., Ferens, K., McLeod, R.: A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In: International Conference on Advances on Applied Cognitive Computing (ACC), pp. 25–30 (2017)
17.
Zurück zum Zitat Rathore, H., Badarla, V., Shit, S.: Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 12(3), 21 (2016) Rathore, H., Badarla, V., Shit, S.: Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 12(3), 21 (2016)
18.
Zurück zum Zitat Sharma, V., Lee, K., Kwon, S., Kim, J., Park, H., Yim, K., Lee, S.Y.: A consensus framework for reliability and mitigation of zero-day attacks in IoT. Secur. Commun. Netw. 2017, 1–24 (2017). Article ID 4749085 Sharma, V., Lee, K., Kwon, S., Kim, J., Park, H., Yim, K., Lee, S.Y.: A consensus framework for reliability and mitigation of zero-day attacks in IoT. Secur. Commun. Netw. 2017, 1–24 (2017). Article ID 4749085
19.
Zurück zum Zitat Wang, C., Feng, T., Kim, J., Wang, G., Zhang, W.: Catching packet droppers and modifiers in wireless sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9. IEEE (2009) Wang, C., Feng, T., Kim, J., Wang, G., Zhang, W.: Catching packet droppers and modifiers in wireless sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9. IEEE (2009)
20.
Zurück zum Zitat Withanage, C., Ashok, R., Yuen, C., Otto, K.: A comparison of the popular home automation technologies. In: 2014 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), pp. 600–605. IEEE (2014) Withanage, C., Ashok, R., Yuen, C., Otto, K.: A comparison of the popular home automation technologies. In: 2014 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), pp. 600–605. IEEE (2014)
21.
Zurück zum Zitat Yun, J., Seo, S., Chung, J.: Centralized trust-based secure routing in wireless networks. IEEE Wirel. Commun. Letters 7(6), 1066–1069 (2018)CrossRef Yun, J., Seo, S., Chung, J.: Centralized trust-based secure routing in wireless networks. IEEE Wirel. Commun. Letters 7(6), 1066–1069 (2018)CrossRef
22.
Zurück zum Zitat Zou, J., Ye, B., Qu, L., Wang, Y., Orgun, M.A., Li, L.: A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services. IEEE Trans. Serv. Comput. 12, 429–445 (2018)CrossRef Zou, J., Ye, B., Qu, L., Wang, Y., Orgun, M.A., Li, L.: A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services. IEEE Trans. Serv. Comput. 12, 429–445 (2018)CrossRef
Metadaten
Titel
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks
verfasst von
Zuchao Ma
Liang Liu
Weizhi Meng
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-55304-3_13

Premium Partner