DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks

被引:8
|
作者
Ma, Zuchao [1 ]
Liu, Liang [1 ]
Meng, Weizhi [2 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Tech Univ Denmark, Dept Appl Math & Comp Sci, Lyngby, Denmark
基金
中国国家自然科学基金;
关键词
IoT network; Malicious node; Trust management; Consensus; K-means method; INTRUSION DETECTION;
D O I
10.1007/978-3-030-55304-3_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is growing rapidly, which allows many smart devices to connect and cooperate with each other. While for the sake of distributed architecture, an IoT environment is known to be vulnerable to insider attacks. In this work, we focus on this challenge and consider an advanced insider threat, called multiple-mix attack, which typically combines three sub-attacks: tamper attack, drop attack and replay attack. For protection, we develop a Distributed Consensus based Trust Model (DCONST), which can build the nodes' reputation by sharing particular information, called cognition. In particular, DCONST can detect malicious nodes by using the K-Means clustering, without disturbing the normal operations of a network. In the evaluation, as compared with some similar models, DCONST can overall provide a better detection rate by increasing around 10% to 40%.
引用
收藏
页码:247 / 267
页数:21
相关论文
共 30 条
  • [1] Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks
    Liu, Liang
    Ma, Zuchao
    Meng, Weizhi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 865 - 879
  • [2] Towards multiple-mix-attack detection via consensus-based trust management in IoT networks
    Ma, Zuchao
    Liu, Liang
    Meng, Weizhi
    [J]. COMPUTERS & SECURITY, 2020, 96
  • [3] Consensus-Based Detection of Malicious Nodes in Cooperative Wireless Networks
    Tomasin, Stefano
    [J]. IEEE COMMUNICATIONS LETTERS, 2011, 15 (04) : 404 - 406
  • [4] Simultaneous attack of a stationary target using multiple missiles: a consensus-based approach
    Zhou, Jialing
    Yang, Jianying
    Li, Zhongkui
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (07)
  • [5] Simultaneous attack of a stationary target using multiple missiles: a consensus-based approach
    Jialing Zhou
    Jianying Yang
    Zhongkui Li
    [J]. Science China Information Sciences, 2017, 60
  • [6] Simultaneous attack of a stationary target using multiple missiles: a consensus-based approach
    Jialing ZHOU
    Jianying YANG
    Zhongkui LI
    [J]. Science China(Information Sciences), 2017, 60 (07) : 67 - 80
  • [7] Detection of Multiple Malicious Nodes using entropy for mitigating the effect of Denial of Service Attack in VANETs
    Kamboj, Sushil
    Mann, Kulwinder Singh
    [J]. 2018 4TH INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS), 2018, : 72 - 79
  • [8] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Ahmed, Adnan
    Abu Bakar, Kamalrulnizam
    Channa, Muhammad Ibrahim
    Haseeb, Khalid
    Khan, Abdul Waheed
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) : 280 - 296
  • [9] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan Ahmed
    Kamalrulnizam Abu Bakar
    Muhammad Ibrahim Channa
    Khalid Haseeb
    Abdul Waheed Khan
    [J]. Frontiers of Computer Science, 2015, 9 : 280 - 296
  • [10] A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks
    Adnan AHMED
    Kamalrulnizam ABU BAKAR
    Muhammad Ibrahim CHANNA
    Khalid HASEEB
    Abdul Waheed KHAN
    [J]. Frontiers of Computer Science, 2015, 9 (02) : 280 - 296