Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things

被引:53
|
作者
Haripriya, A. P. [1 ]
Kulothungan, K. [1 ]
机构
[1] Anna Univ, Dept IST, Chennai, Tamil Nadu, India
关键词
Intrusion detection; Fuzzy interpolation; Fuzzy inference engine; Rule base; Publisher; Subscriber; Broker; INTRUSION DETECTION;
D O I
10.1186/s13638-019-1402-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to various types of attacks including DoS Attack. MQTT is widely used in secure IoT applications like health monitoring. One of the prominent attacks in IoT is the denial of service (DoS) attack. This enforces the need for an efficient intrusion detection system method in MQTT-based application. In this paper, we address the vulnerabilities in MQTT, through which intruders can control the low-configuration devices in the network. This paper proposes a lightweight fuzzy logic-based intrusion detection scheme called Secure-MQTT, for detecting malicious activity during the communication between IoT devices. The proposed method uses a fuzzy logic-based system to detect the malicious behavior of the node with the help of a fuzzy rule interpolation mechanism. Secure-MQTT avoids the use of a dense rule base by exploiting the fuzzy rule interpolation that generates rules dynamically. The proposed method provides an effective mechanism to protect the low configuration devices from the DoS attack. The simulation results show that the proposed method detects the attacks more accurately when compared to the existing methods.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] A Fuzzy Logic-Based Energy Efficient Packet Loss Preventive Routing Protocol
    Misra, Sudip
    Obaidat, Mohammad S.
    Roy, Sanchita
    Mohanta, Debashish
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2009, 41 (04): : 185 - +
  • [22] EEFMCP: energy efficient fuzzy logic-based multi-clustering protocol
    Pankaj Kumar Mishra
    Shashi Kant Verma
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1991 - 2005
  • [23] Efficient and secure searchable encryption protocol for cloud-based Internet of Things
    Wu, Libing
    Chen, Biwen
    Choo, Kim-Kwang Raymond
    He, Debiao
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 152 - 161
  • [24] Green Computing in Sensors-Enabled Internet of Things: Neuro Fuzzy Logic-Based Load Balancing
    Kashyap, Pankaj Kumar
    Kumar, Sushil
    Dohare, Upasana
    Kumar, Vinod
    Kharel, Rupak
    ELECTRONICS, 2019, 8 (04)
  • [25] F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-in-Motion Using MQTT Protocol
    Al-Joboury, Istabraq M.
    Al-Hemiary, Emad H.
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 368 - 379
  • [26] Fuzzy logic-based approach to develop hybrid similarity measure for efficient information retrieval
    Gupta, Yogesh
    Saini, Ashish
    Saxena, A. K.
    JOURNAL OF INFORMATION SCIENCE, 2014, 40 (06) : 846 - 857
  • [27] A two pass fuzzy logic-based approach for efficient rendering of point sampled surfaces
    Bhakar, Sushil
    Rajagopalan, Ramgopal
    Mudur, Sudhir
    NAFIPS 2006 - 2006 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY, VOLS 1 AND 2, 2006, : 329 - +
  • [28] A Two-Stage Assessment Approach for QoS in Internet of Things based on Fuzzy Logic
    Adam, Mutasim Elsadig
    Hamid, Yasir Abdalgadir Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (04) : 689 - 696
  • [29] Optimized Fuzzy Logic Based Energy-Efficient Geographical Data Routing in Internet of Things
    Aravind, Kalavagunta
    Maddikunta, Praveen Kumar Reddy
    IEEE ACCESS, 2024, 12 : 18913 - 18930
  • [30] Passive Rule-Based Approach to Detect Sinkhole Attack in RPL-Based Internet of Things Networks
    Al-Sarawi, Shadi
    Anbar, Mohammed
    Alabsi, Basim Ahmad
    Aladaileh, Mohammad Adnan
    Rihan, Shaza Dawood Ahmed
    IEEE ACCESS, 2023, 11 : 94081 - 94093