The limitations of unsupervised machine learning for identifying malicious nodes in IoT networks

被引:1
|
作者
Sadek, Fatima Salma [1 ]
Abouaissa, Abdelhafid [2 ]
Lorenz, Pascal [2 ]
机构
[1] Univ Haute Alsace, USTOMB Univ, SIMPA Lab, IRIMAS Inst, Mulhouse, France
[2] Univ Haute Alsace, IRIMAS Inst, Mulhouse, France
关键词
Security Internet of Things (IoT); Greedy behavior attack; detection of greedy nodes; K-means; clustering; GREEDY BEHAVIOR;
D O I
10.1109/GLOBECOM48099.2022.10001314
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's time, the security in IoT networks interests the scientific community. Indeed, IoT networks are confronted with numerous vulnerabilities, including denial of service, which represents a real threat. The greedy behavior attack is arguably one of the most dangerous and intelligent attacks. Its intelligence lies in the fact that the malicious node executes its attack internally by pretending to be a legitimate node and deliberately falsifying its CSMA-CA parameters. In this paper, we propose a new approach for greedy nodes detection based on an unsupervised machine learning method. In order to evaluate the effectiveness of the proposed method, and to prove the limits of this technique, several attack scenarios were carried out into cooja, and different simulation parameters were taken into account such as the number of packets sent, the energy consumption, and radio status. The detection efficiency of the proposed method is evaluated in two cases, best and worst case. In the first, the detection accuracy is equal to 88.5%, while in the worst it is equal to 86.42%. Index Terms-Security Internet
引用
收藏
页码:1984 / 1989
页数:6
相关论文
共 50 条
  • [1] Identifying Malicious Nodes in Multihop IoT Networks using Diversity and Unsupervised Learning
    Liu, Xin
    Abdelhakim, Mai
    Krishnamurthy, Prashant
    Tipper, David
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [2] Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
    Asghar, Muhammad Nabeel
    Asif, Muhammad
    Murad, Zara
    Alyahya, Ahmed
    [J]. IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2024, 20 (02):
  • [3] Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
    Asghar, Muhammad Nabeel
    Raza, Muhammad Asif
    Murad, Zara
    Alyahya, Ahmed
    [J]. IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2024, 20 (01): : 24 - 35
  • [4] A supervised active learning method for identifying critical nodes in IoT networks
    Ojaghi, Behnam
    Dehshibi, Mohammad Mahdi
    Antonopoulos, Angelos
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (12): : 16775 - 16794
  • [5] Machine Learning Models for Malicious Traffic Detection in IoT Networks/IoT-23 Dataset/
    Oha, Chibueze Victor
    Farouk, Fathima Shakoora
    Patel, Pujan Pankaj
    Meka, Prithvi
    Nekkanti, Sowmya
    Nayini, Bhageerath
    Carvalho, Smit Xavier
    Desai, Nisarg
    Patel, Manishkumar
    Butakov, Sergey
    [J]. MACHINE LEARNING FOR NETWORKING, MLN 2021, 2022, 13175 : 69 - 84
  • [6] A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks
    Wang, Fang
    Wei, Zhe
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (08) : 1084 - 1087
  • [7] Identifying Misbehaving Greedy Nodes in IoT Networks
    Sadek, Fatima Salma
    Belkadi, Khaled
    Abouaissa, Abdelhafid
    Lorenz, Pascal
    [J]. SENSORS, 2021, 21 (15)
  • [8] A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks
    Zhao, Gouheng
    Jia, Peng
    Huang, Cheng
    Zhou, Anmin
    Fang, Yong
    [J]. IEEE ACCESS, 2020, 8 : 65462 - 65471
  • [9] A detection mechanism on malicious nodes in IoT
    Li, Bohan
    Ye, Renjun
    Gu, Gao
    Liang, Ruochen
    Liu, Wei
    Cai, Ken
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 51 - 59
  • [10] Identifying malicious nodes in mobile ad hoc networks using a reputation scheme based on reinforcement learning
    Usaha, Wipawee
    Maneenil, Karnkamon
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1831 - +