Identifying Malicious Nodes in Multihop IoT Networks using Diversity and Unsupervised Learning

被引:0
|
作者
Liu, Xin [1 ]
Abdelhakim, Mai [1 ]
Krishnamurthy, Prashant [1 ]
Tipper, David [1 ]
机构
[1] Univ Pittsburgh, Sch Comp & Informat, Pittsburgh, PA 15260 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increased connectivity introduced in Internet of Things (IoT) applications makes such systems vulnerable to serious security threats. In this paper, we consider one of the most challenging threats in IoT networks, where devices manipulate (maliciously or unintentionally) data transmitted in information packets as they are being forwarded from the source to the destination. We propose unsupervised learning that exploits network diversity to detect and identify suspicious networked elements. Our proposed method can identify suspicious nodes along multihop transmission paths and under variable attack levels within the network. More specifically, we formulate a contribution metric for each networked element, which is used as a feature to cluster the nodes based on their behavior. We proposed two detection approaches, namely hard detection and soft detection. In the former, nodes are clustered into malicious or benign group; while in the latter, nodes are clustered into three groups based on their suspicious level, then highly suspicious nodes are discarded and more accurate contribution features are evaluated for the remaining nodes. Soft detection has higher detection accuracy provided that there is sufficient network diversity. Simulation results show the proposed methods achieve high detection accuracy under different percentages of malicious nodes in the network and in the existence of channel errors.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Identifying Vulnerable IoT Applications using Deep Learning
    Naeem, Hajra
    Alalfi, Manar H.
    [J]. PROCEEDINGS OF THE 2020 IEEE 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER '20), 2020, : 582 - 586
  • [42] Identifying influential nodes based on network representation learning in complex networks
    Wei, Hao
    Pan, Zhisong
    Hu, Guyu
    Zhang, Liangliang
    Yang, Haimin
    Li, Xin
    Zhou, Xingyu
    [J]. PLOS ONE, 2018, 13 (07):
  • [43] A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks
    Zhao, Gouheng
    Jia, Peng
    Huang, Cheng
    Zhou, Anmin
    Fang, Yong
    [J]. IEEE ACCESS, 2020, 8 : 65462 - 65471
  • [44] Identifying Malicious Users in the Offshore Leaks Networks via Structural Node Representation Learning
    Daley, Brian
    Serra, Edoardo
    Cuzzocrea, Alfredo
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 5095 - 5101
  • [45] Challenges in identifying asthma endotypes using unsupervised learning techniques
    Prosperi, M. C. F.
    Sahiner, U. M.
    Belgrave, D.
    Buchan, I. E.
    Sackesen, C.
    Simpson, A.
    Yavuz, T. S.
    Custovic, A.
    Kalayci, O.
    [J]. ALLERGY, 2013, 68 : 668 - 669
  • [46] Identifying Influential Nodes in Bipartite Networks Using the Clustering Coefficient
    Liebig, Jessica
    Rao, Asha
    [J]. 10TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY AND INTERNET-BASED SYSTEMS SITIS 2014, 2014, : 323 - 330
  • [47] Active Learning for IoT Data Prioritization in Edge Nodes Over Wireless Networks
    Chen-Khong Tham
    Rajagopalan, Rajalaxmi
    [J]. IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 4453 - 4458
  • [48] Physical Layer Detection of Malicious Relays in LTE-A Network Using Unsupervised Learning
    Yengi, Yeliz
    Kavak, Adnan
    Arslan, Huseyin
    [J]. IEEE ACCESS, 2020, 8 (08): : 154713 - 154726
  • [49] Cooperation diversity in multihop wireless networks using opportunistic driven multiple access
    Scutari, G
    Barbarossa, S
    Ludovici, D
    [J]. 2003 4TH IEEE WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS - SPAWC 2003, 2004, : 170 - 174
  • [50] Security Enhancement of Fog Nodes in IoT Networks Using the IBF Scheme
    Natraj, N. A.
    Sundari, V. Kamatchi
    Ananthi, K.
    Rathika, S.
    Indira, G.
    Rathish, C. R.
    [J]. THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 119 - 129