Skip to main content
Top

2020 | OriginalPaper | Chapter

DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks

Authors : Zuchao Ma, Liang Liu, Weizhi Meng

Published in: Information Security and Privacy

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Internet of Things (IoT) is growing rapidly, which allows many smart devices to connect and cooperate with each other. While for the sake of distributed architecture, an IoT environment is known to be vulnerable to insider attacks. In this work, we focus on this challenge and consider an advanced insider threat, called multiple-mix attack, which typically combines three sub-attacks: tamper attack, drop attack and replay attack. For protection, we develop a Distributed Consensus based Trust Model (DCONST), which can build the nodes’ reputation by sharing particular information, called cognition. In particular, DCONST can detect malicious nodes by using the K-Means clustering, without disturbing the normal operations of a network. In the evaluation, as compared with some similar models, DCONST can overall provide a better detection rate by increasing around 10% to 40%.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Anguraj, D.K., Smys, S.: Trust-based intrusion detection and clustering approach for wireless body area networks. Wireless Pers. Commun. 104(1), 1–20 (2019)CrossRef Anguraj, D.K., Smys, S.: Trust-based intrusion detection and clustering approach for wireless body area networks. Wireless Pers. Commun. 104(1), 1–20 (2019)CrossRef
2.
go back to reference Cho, J.H., Chen, R.: PROVEST: provenance-based trust model for delay tolerant networks. IEEE Trans. Dependable Secure Comput. 15(1), 151–165 (2016)CrossRef Cho, J.H., Chen, R.: PROVEST: provenance-based trust model for delay tolerant networks. IEEE Trans. Dependable Secure Comput. 15(1), 151–165 (2016)CrossRef
3.
go back to reference Cho, J., Swami, A., Chen, I.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2011)CrossRef Cho, J., Swami, A., Chen, I.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562–583 (2011)CrossRef
4.
go back to reference Hongning, L., Xianjun, L., Leilei, X.: Analysis of distributed consensus-based spectrum sensing algorithm in cognitive radio networks. In: 2014 Tenth International Conference on Computational Intelligence and Security, pp. 593–597. IEEE (2014) Hongning, L., Xianjun, L., Leilei, X.: Analysis of distributed consensus-based spectrum sensing algorithm in cognitive radio networks. In: 2014 Tenth International Conference on Computational Intelligence and Security, pp. 593–597. IEEE (2014)
5.
go back to reference Kaveri, A., Geetha, K., Kaveri, A., Geetha, K.: Enhanced secure data transmission in manet networks using consensus based and trust aware protocol. Int. J. 4, 14–25 (2018) Kaveri, A., Geetha, K., Kaveri, A., Geetha, K.: Enhanced secure data transmission in manet networks using consensus based and trust aware protocol. Int. J. 4, 14–25 (2018)
6.
go back to reference Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 16(4), 1933–1954 (2014)CrossRef Komninos, N., Philippou, E., Pitsillides, A.: Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun. Surv. Tutor. 16(4), 1933–1954 (2014)CrossRef
7.
go back to reference Li, W., Meng, W., Kwok, L., Ip, H.H.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)CrossRef Li, W., Meng, W., Kwok, L., Ip, H.H.: Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model. J. Netw. Comput. Appl. 77, 135–145 (2017)CrossRef
8.
go back to reference Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 101, 865–879 (2019)CrossRef Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Future Gener. Comput. Syst. 101, 865–879 (2019)CrossRef
9.
go back to reference Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018) Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1–6. IEEE (2018)
10.
go back to reference Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using dual link technologies and unsupervised learning. Open J. Internet Things (OJIOT) 4(1), 109–125 (2018) Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using dual link technologies and unsupervised learning. Open J. Internet Things (OJIOT) 4(1), 109–125 (2018)
11.
go back to reference Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015) Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)
12.
go back to reference Mazdin, P., Arbanas, B., Haus, T., Bogdan, S., Petrovic, T., Miskovic, N.: Trust consensus protocol for heterogeneous underwater robotic systems. IFAC-PapersOnLine 49(23), 341–346 (2016)CrossRef Mazdin, P., Arbanas, B., Haus, T., Bogdan, S., Petrovic, T., Miskovic, N.: Trust consensus protocol for heterogeneous underwater robotic systems. IFAC-PapersOnLine 49(23), 341–346 (2016)CrossRef
13.
go back to reference Meng, W.: Intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer 51(7), 36–43 (2018)CrossRef Meng, W.: Intrusion detection in the era of IoT: building trust via traffic filtering and sampling. Computer 51(7), 36–43 (2018)CrossRef
14.
go back to reference Meng, W., Choo, K.R., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(2), 761–773 (2018)CrossRef Meng, W., Choo, K.R., Furnell, S., Vasilakos, A.V., Probst, C.W.: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(2), 761–773 (2018)CrossRef
15.
go back to reference Meng, W., Li, W., Xiang, Y., Choo, K.K.R.: A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162–169 (2017)CrossRef Meng, W., Li, W., Xiang, Y., Choo, K.K.R.: A Bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162–169 (2017)CrossRef
16.
go back to reference Nahiyan, K., Kaiser, S., Ferens, K., McLeod, R.: A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In: International Conference on Advances on Applied Cognitive Computing (ACC), pp. 25–30 (2017) Nahiyan, K., Kaiser, S., Ferens, K., McLeod, R.: A multi-agent based cognitive approach to unsupervised feature extraction and classification for network intrusion detection. In: International Conference on Advances on Applied Cognitive Computing (ACC), pp. 25–30 (2017)
17.
go back to reference Rathore, H., Badarla, V., Shit, S.: Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 12(3), 21 (2016) Rathore, H., Badarla, V., Shit, S.: Consensus-aware sociopsychological trust model for wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 12(3), 21 (2016)
18.
go back to reference Sharma, V., Lee, K., Kwon, S., Kim, J., Park, H., Yim, K., Lee, S.Y.: A consensus framework for reliability and mitigation of zero-day attacks in IoT. Secur. Commun. Netw. 2017, 1–24 (2017). Article ID 4749085 Sharma, V., Lee, K., Kwon, S., Kim, J., Park, H., Yim, K., Lee, S.Y.: A consensus framework for reliability and mitigation of zero-day attacks in IoT. Secur. Commun. Netw. 2017, 1–24 (2017). Article ID 4749085
19.
go back to reference Wang, C., Feng, T., Kim, J., Wang, G., Zhang, W.: Catching packet droppers and modifiers in wireless sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9. IEEE (2009) Wang, C., Feng, T., Kim, J., Wang, G., Zhang, W.: Catching packet droppers and modifiers in wireless sensor networks. In: 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 1–9. IEEE (2009)
20.
go back to reference Withanage, C., Ashok, R., Yuen, C., Otto, K.: A comparison of the popular home automation technologies. In: 2014 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), pp. 600–605. IEEE (2014) Withanage, C., Ashok, R., Yuen, C., Otto, K.: A comparison of the popular home automation technologies. In: 2014 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), pp. 600–605. IEEE (2014)
21.
go back to reference Yun, J., Seo, S., Chung, J.: Centralized trust-based secure routing in wireless networks. IEEE Wirel. Commun. Letters 7(6), 1066–1069 (2018)CrossRef Yun, J., Seo, S., Chung, J.: Centralized trust-based secure routing in wireless networks. IEEE Wirel. Commun. Letters 7(6), 1066–1069 (2018)CrossRef
22.
go back to reference Zou, J., Ye, B., Qu, L., Wang, Y., Orgun, M.A., Li, L.: A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services. IEEE Trans. Serv. Comput. 12, 429–445 (2018)CrossRef Zou, J., Ye, B., Qu, L., Wang, Y., Orgun, M.A., Li, L.: A proof-of-trust consensus protocol for enhancing accountability in crowdsourcing services. IEEE Trans. Serv. Comput. 12, 429–445 (2018)CrossRef
Metadata
Title
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks
Authors
Zuchao Ma
Liang Liu
Weizhi Meng
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-55304-3_13

Premium Partner