Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things

被引:53
|
作者
Haripriya, A. P. [1 ]
Kulothungan, K. [1 ]
机构
[1] Anna Univ, Dept IST, Chennai, Tamil Nadu, India
关键词
Intrusion detection; Fuzzy interpolation; Fuzzy inference engine; Rule base; Publisher; Subscriber; Broker; INTRUSION DETECTION;
D O I
10.1186/s13638-019-1402-8
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The advancements in the domain of Internet of Things (IoT) accelerated the development of new communication technologies. Machine to machine communication in IoT is accomplished with application protocols such as the Constrained Application Protocol and Message Queuing Telemetry Transport (MQTT). The openness of these protocols leads to various types of attacks including DoS Attack. MQTT is widely used in secure IoT applications like health monitoring. One of the prominent attacks in IoT is the denial of service (DoS) attack. This enforces the need for an efficient intrusion detection system method in MQTT-based application. In this paper, we address the vulnerabilities in MQTT, through which intruders can control the low-configuration devices in the network. This paper proposes a lightweight fuzzy logic-based intrusion detection scheme called Secure-MQTT, for detecting malicious activity during the communication between IoT devices. The proposed method uses a fuzzy logic-based system to detect the malicious behavior of the node with the help of a fuzzy rule interpolation mechanism. Secure-MQTT avoids the use of a dense rule base by exploiting the fuzzy rule interpolation that generates rules dynamically. The proposed method provides an effective mechanism to protect the low configuration devices from the DoS attack. The simulation results show that the proposed method detects the attacks more accurately when compared to the existing methods.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] An efficient attack detection approach for software defined Internet of Things using Jaya optimisation based feature selection technique
    Chauhan, Pinkey
    Atulkar, Mithilesh
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2025, 31 (01)
  • [42] A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method
    Ghanbari, Zahra
    Navimipour, Nima Jafari
    Hosseinzadeh, Mehdi
    Shakeri, Hassan
    Darwesh, Aso
    PERVASIVE AND MOBILE COMPUTING, 2024, 97
  • [43] T2FL-PSO: Type-2 Fuzzy Logic-Based Particle Swarm Optimization Algorithm Used to Maximize the Lifetime of Internet of Things
    Sennan, Sankar
    Ramasubbareddy, Somula
    Balasubramaniyam, Sathiyabhama
    Anand Nayyar
    Abouhawwash, Mohamed
    Hikal, Noha A.
    IEEE ACCESS, 2021, 9 : 63966 - 63979
  • [44] Grey wolf optimization with fuzzy logic for energy-efficient communication in wireless sensor network-based Internet of Things scenario
    Verma, Kritika
    Baliyan, Niyati
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (17)
  • [45] A New Energy-Aware Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic
    Ghanbari, Zahra
    Navimipour, Nima Jafari
    Hosseinzadeh, Mehdi
    Shakeri, Hassan
    Darwesh, Aso
    SSRN, 2022,
  • [46] CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic
    Milad Mohseni
    Fatemeh Amirghafouri
    Behrouz Pourghebleh
    Peer-to-Peer Networking and Applications, 2023, 16 : 189 - 209
  • [47] CEDAR: A cluster-based energy-aware data aggregation routing protocol in the internet of things using capuchin search algorithm and fuzzy logic
    Mohseni, Milad
    Amirghafouri, Fatemeh
    Pourghebleh, Behrouz
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 189 - 209
  • [48] A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic- and fog-based approach
    Syed Rameem Zahra
    Mohammad Ahsan Chishti
    Neural Computing and Applications, 2022, 34 : 6927 - 6952
  • [49] A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic- and fog-based approach
    Zahra, Syed Rameem
    Chishti, Mohammad Ahsan
    NEURAL COMPUTING & APPLICATIONS, 2022, 34 (09): : 6927 - 6952
  • [50] RETRACTED: EMEECP-IOT: Enhanced Multitier Energy-Efficient Clustering Protocol Integrated with Internet of Things-Based Secure Heterogeneous Wireless Sensor Network (HWSN) (Retracted Article)
    Wang, Yongcheng
    Zhang, Guohui
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022