Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things

被引:53
|
作者
Haripriya, A. P. [1 ]
Kulothungan, K. [1 ]
机构
[1] Anna Univ, Dept IST, Chennai, Tamil Nadu, India
关键词
Intrusion detection; Fuzzy interpolation; Fuzzy inference engine; Rule base; Publisher; Subscriber; Broker; INTRUSION DETECTION;
D O I
10.1186/s13638-019-1402-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to various types of attacks including DoS Attack. MQTT is widely used in secure IoT applications like health monitoring. One of the prominent attacks in IoT is the denial of service (DoS) attack. This enforces the need for an efficient intrusion detection system method in MQTT-based application. In this paper, we address the vulnerabilities in MQTT, through which intruders can control the low-configuration devices in the network. This paper proposes a lightweight fuzzy logic-based intrusion detection scheme called Secure-MQTT, for detecting malicious activity during the communication between IoT devices. The proposed method uses a fuzzy logic-based system to detect the malicious behavior of the node with the help of a fuzzy rule interpolation mechanism. Secure-MQTT avoids the use of a dense rule base by exploiting the fuzzy rule interpolation that generates rules dynamically. The proposed method provides an effective mechanism to protect the low configuration devices from the DoS attack. The simulation results show that the proposed method detects the attacks more accurately when compared to the existing methods.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] Fuzzy Logic-Based Autonomous Lane Changing Strategy for Intelligent Internet of Vehicles: A Trajectory Planning Approach
    He, Chao
    Jiang, Wenhui
    Li, Junting
    Wei, Jian
    Guo, Jiang
    Zhang, Qiankun
    WORLD ELECTRIC VEHICLE JOURNAL, 2024, 15 (09):
  • [32] An Efficient Secure and Adaptive Routing Protocol Based on GMM-HMM-LSTM for Internet of Underwater Things
    Zhu, Rongxin
    Boukerche, Azzedine
    Yang, Qiuling
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16491 - 16504
  • [33] Fuzzy logic-based transmission power control algorithm for energy efficient MAC protocol in wireless sensor networks
    Sabitha, Ramakrishnan
    Thyagarajan, Thangavelu
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2012, 9 (3-4) : 247 - 265
  • [34] An energy-efficient adaptive beaconing rate management for pedestrian safety: A fuzzy logic-based approach
    Alemneh, Esubalew
    Senouci, Sidi-Mohammed
    Messous, Mohamed-Ayoub
    PERVASIVE AND MOBILE COMPUTING, 2020, 69
  • [35] A new fuzzy logic-based query expansion model for efficient information retrieval using relevance feedback approach
    Singh, Jagendra
    Sharan, Aditi
    NEURAL COMPUTING & APPLICATIONS, 2017, 28 (09): : 2557 - 2580
  • [36] A new fuzzy logic-based query expansion model for efficient information retrieval using relevance feedback approach
    Jagendra Singh
    Aditi Sharan
    Neural Computing and Applications, 2017, 28 : 2557 - 2580
  • [37] DC-IIoT: A Secure and Efficient Authentication Protocol for Industrial Internet-of-Things Based on Distributed Control Plane
    Salam, Rakesh
    Roy, Prasanta Kumar
    Bhattacharya, Ansuman
    INTERNET OF THINGS, 2023, 22
  • [38] Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things
    Maurya A.K.
    Sastry V.N.
    Information (Switzerland), 2017, 8 (04)
  • [39] Hardware Implementation of Fuzzy Logic-Based Energy-Efficient Routing Protocol for Environment Monitoring Application of Wireless Sensor Networks
    Saxena, Prakash
    Bhadauria, Sarita Singh
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2025, 38 (08)
  • [40] BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things
    Ali, Shayan E.
    Tariq, Noshina
    Khan, Farrukh Aslam
    Ashraf, Muhammad
    Abdul, Wadood
    Saleem, Kashif
    SENSORS, 2023, 23 (09)