Skip to main content
Top
Published in: Wireless Personal Communications 2/2023

19-09-2022

Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network

Authors: Gamini Joshi, Vidushi Sharma

Published in: Wireless Personal Communications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The exposure of IoT nodes to the internet makes them vulnerable to malicious attacks and failures. These failures affect the survivability, integrity, and connectivity of the network. Thus, the detection and elimination of attacks in a timely manner become an important factor to maintain network connectivity. Trust-based techniques are used in understanding the behavior of nodes in the network. The proposed conventional trust models are power-hungry and demand large storage space. Succeeding this Hidden Markov Models have also been developed to calculate trust but the survivability of the network achieved from them is low. To improve survivability, selfish and malicious nodes present in the network are required to be treated separately. Hence, in this paper, an improved Hidden Markov Trust (HMT) model is developed, which accurately detects the selfish and malicious nodes that illegally intercept the network. The proposed model comprises the Learning Module which aims to understand the behavior of nodes and compute trust using HMT with the expected output. The probability parameters of the HMT model are derived from the data flow rate and the residual energy of the nodes. Next, in Decision-Module, the actual nature of the node is obtained with the help of the evaluated node’s likelihood functions. If the node is selfish and is close to crashed state then, is isolated from the routing function, while the selfish node with sufficient energy is immediately destroyed from the network. On the other hand, malicious nodes are provided with a time-based opportunity to reset themselves before being knocked down. Finally, if the node is legitimate, then the function continues smoothly. At last, the Path-Formation-Module establishes the trusted optimal routing path. Further, comparative analysis for attacks such as black-hole, grey-hole, and sink-hole has been done and performance parameters have been extended to survivability-rate, power consumption, delay, and false-alarm-rate, for different network sizes and vulnerability. Simulation result on average provides a 10% higher PDR, 29% lower overhead, and 17% higher detection rate when compared to a Futuristic Cooperation Evaluation Model, Futuristic Trust Coefficient-based Semi-Markov Prediction Model, Opportunistic Data Forwarding Mechanism, and Priority-based Trust Efficient Routing using Ant Colony Optimization trust models presented in the literature.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Akhtar, A. K., & Sahoo, G. (2012). Mathematical model for the detection of selfish nodes in MANETs. International Journal of Computer Science and Informatics, 5(3), 25–28. Akhtar, A. K., & Sahoo, G. (2012). Mathematical model for the detection of selfish nodes in MANETs. International Journal of Computer Science and Informatics, 5(3), 25–28.
7.
go back to reference Gonçalves, A. J. R., Rabêlo, R. A. L., Rodrigues, J. J. P. C., & Oliveira, L. M. L. (2020). A mobility solution for low power and lossy networks using the LOADng protocol. Transactions on Emerging Telecommunications Technologies, 31(12), 1–24. https://doi.org/10.1002/ett.3878CrossRef Gonçalves, A. J. R., Rabêlo, R. A. L., Rodrigues, J. J. P. C., & Oliveira, L. M. L. (2020). A mobility solution for low power and lossy networks using the LOADng protocol. Transactions on Emerging Telecommunications Technologies, 31(12), 1–24. https://​doi.​org/​10.​1002/​ett.​3878CrossRef
13.
17.
go back to reference Liu, X., & Datta, A. (2012). Modeling context aware dynamic trust using hidden markov model. In Proceedings of the National Conference on Artificial Intelligence (Vol. 3, pp. 1938–1944). Liu, X., & Datta, A. (2012). Modeling context aware dynamic trust using hidden markov model. In Proceedings of the National Conference on Artificial Intelligence (Vol. 3, pp. 1938–1944).
19.
go back to reference Alam, M. M., Sajid, M. S. I., Wang, W., & Wei, J. (2022). IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. In 2022 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1695–1700). IEEE. https://doi.org/10.1109/WCNC51071.2022.9771878 Alam, M. M., Sajid, M. S. I., Wang, W., & Wei, J. (2022). IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. In 2022 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1695–1700). IEEE. https://​doi.​org/​10.​1109/​WCNC51071.​2022.​9771878
22.
go back to reference Chen, C.-M., Guan, D.-J., Huang, Y.-Z., & Ou, Y.-H. (2016). Anomaly network intrusion detection using hidden Markov model. In International Journal of Innovative Computing, Information and Control (pp. 569–580). Chen, C.-M., Guan, D.-J., Huang, Y.-Z., & Ou, Y.-H. (2016). Anomaly network intrusion detection using hidden Markov model. In International Journal of Innovative Computing, Information and Control (pp. 569–580).
27.
30.
go back to reference Daniel Jurafsky, J. H. M. (2019). Hidden Markov Models. In Speech and Language Processing (3rd ed. draft) (Vol. 16, pp. 795–796). Daniel Jurafsky, J. H. M. (2019). Hidden Markov Models. In Speech and Language Processing (3rd ed. draft) (Vol. 16, pp. 795–796).
Metadata
Title
Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network
Authors
Gamini Joshi
Vidushi Sharma
Publication date
19-09-2022
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-022-10007-6

Other articles of this Issue 2/2023

Wireless Personal Communications 2/2023 Go to the issue