Identifying Malicious Nodes in Multihop IoT Networks using Diversity and Unsupervised Learning

被引:0
|
作者
Liu, Xin [1 ]
Abdelhakim, Mai [1 ]
Krishnamurthy, Prashant [1 ]
Tipper, David [1 ]
机构
[1] Univ Pittsburgh, Sch Comp & Informat, Pittsburgh, PA 15260 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increased connectivity introduced in Internet of Things (IoT) applications makes such systems vulnerable to serious security threats. In this paper, we consider one of the most challenging threats in IoT networks, where devices manipulate (maliciously or unintentionally) data transmitted in information packets as they are being forwarded from the source to the destination. We propose unsupervised learning that exploits network diversity to detect and identify suspicious networked elements. Our proposed method can identify suspicious nodes along multihop transmission paths and under variable attack levels within the network. More specifically, we formulate a contribution metric for each networked element, which is used as a feature to cluster the nodes based on their behavior. We proposed two detection approaches, namely hard detection and soft detection. In the former, nodes are clustered into malicious or benign group; while in the latter, nodes are clustered into three groups based on their suspicious level, then highly suspicious nodes are discarded and more accurate contribution features are evaluated for the remaining nodes. Soft detection has higher detection accuracy provided that there is sufficient network diversity. Simulation results show the proposed methods achieve high detection accuracy under different percentages of malicious nodes in the network and in the existence of channel errors.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] The limitations of unsupervised machine learning for identifying malicious nodes in IoT networks
    Sadek, Fatima Salma
    Abouaissa, Abdelhafid
    Lorenz, Pascal
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 1984 - 1989
  • [2] An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network
    Liu, Zhe
    Wu, Yuting
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05): : 4061 - 4071
  • [3] Identifying malicious nodes in mobile ad hoc networks using a reputation scheme based on reinforcement learning
    Usaha, Wipawee
    Maneenil, Karnkamon
    [J]. TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1831 - +
  • [4] A supervised active learning method for identifying critical nodes in IoT networks
    Ojaghi, Behnam
    Dehshibi, Mohammad Mahdi
    Antonopoulos, Angelos
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (12): : 16775 - 16794
  • [5] Improving Trusted Routing by Identifying Malicious Nodes in a MANET Using Reinforcement Learning
    Mayadunna, Hansi
    De Silva, Shanen Leen
    Wedage, Iesha
    Pabasara, Sasanka
    Rupasinghe, Lakmal
    Liyanapathirana, Chethena
    Kesavan, Krishnadeva
    Nawarathna, Chamira
    Sampath, Kalpa Kalhara
    [J]. 2017 17TH INTERNATIONAL CONFERENCE ON ADVANCES IN ICT FOR EMERGING REGIONS (ICTER) - 2017, 2017, : 263 - 270
  • [6] A Statistical Trust for Detecting Malicious Nodes in IoT Sensor Networks
    Wang, Fang
    Wei, Zhe
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (08) : 1084 - 1087
  • [7] Identifying Misbehaving Greedy Nodes in IoT Networks
    Sadek, Fatima Salma
    Belkadi, Khaled
    Abouaissa, Abdelhafid
    Lorenz, Pascal
    [J]. SENSORS, 2021, 21 (15)
  • [8] Preventing malicious nodes in ad hoc networks using reinforcement learning
    Maneenil, K
    Usaha, W
    [J]. 2ND INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATIONS SYSTEMS 2005 (ISWCS 2005), 2005, : 289 - 292
  • [9] Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
    Asghar, Muhammad Nabeel
    Asif, Muhammad
    Murad, Zara
    Alyahya, Ahmed
    [J]. IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2024, 20 (02):
  • [10] Detecting Malicious Botnets in IoT Networks Using Machine Learning Techniques
    Asghar, Muhammad Nabeel
    Raza, Muhammad Asif
    Murad, Zara
    Alyahya, Ahmed
    [J]. IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2024, 20 (01): : 24 - 35