A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic- and fog-based approach

被引:10
|
作者
Zahra, Syed Rameem [1 ]
Chishti, Mohammad Ahsan [2 ]
机构
[1] Natl Inst Technol Srinagar, Dept Comp Sci & Engn, Srinagar, J&k, India
[2] Cent Univ Kashmir, Dept Informat Technol, Ganderbal, J&k, India
来源
NEURAL COMPUTING & APPLICATIONS | 2022年 / 34卷 / 09期
关键词
Fog-IoT; Fuzzy logic; Blackhole attack; Collusion attack; DDoS attack; Insider attacks; BLACK-HOLE ATTACK; INTRUSION DETECTION; CHALLENGES; IOT;
D O I
10.1007/s00521-021-06823-9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Inspired by the massive surge of interest in the Internet of Things (IoT), this work focuses on the kinetics of its security. By automating everything, starting from baby monitors to life-saving medical devices, IoT brought convenience to people's lives and rapidly became a trillion-dollar industry. However, the future of IoT will be decided on how its security and privacy concerns are dealt with. It is a fact that at present, the security of IoT is lacking in coherent and logical perspectives. For example, the researchers do not adequately accommodate the uncertainty and insider attacks while developing the IoT security procedures, even though most security concerns related to IoT arise from an insider and uncertain habitat. This paper provides a critical analysis of the most recent and relevant state-of-art methods of IoT security and identifies the parameters that are crucial for any security posture in IoT. Considering all the intricate details of IoT environments, this work proposes a Generic and Lightweight Security mechanism for detecting malicious behavior in the uncertain IoT using a Fuzzy Logic- and Fog-based approach (GLSF(2)IoT). It is developed on the principle of "zero trust," i.e., trust nothing and treat everything as hostile. While Fuzzy Logic has been used to remove uncertainties, the Fog-IoT architecture makes GLSF(2)IoT inherently better than the cloud-IoT. Once the malicious activity is detected, GLSF(2)IoT automatically limits the network access against the IoT device that initiated this activity, preventing it from targeting other devices. We evaluated GLSF(2)IoT for blackhole, selective forward, collusion and DDoS attacks, i.e., attacks which can invalidate any IoT architecture. Besides yielding better accuracy results than the existing benchmarks, we found that GLSF(2)IoT puts extremely low pressure on the constrained nodes, is scalable, supports heterogeneity, and uncertainty of the IoT environments.
引用
收藏
页码:6927 / 6952
页数:26
相关论文
共 8 条
  • [1] A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic- and fog-based approach
    Syed Rameem Zahra
    Mohammad Ahsan Chishti
    [J]. Neural Computing and Applications, 2022, 34 : 6927 - 6952
  • [2] A lightweight hierarchical method for improving security in the internet of things using fuzzy logic
    Doostani, Shadi
    Barati, Hamid
    Barati, Ali
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (06):
  • [3] Internet of things based smart city design using fog computing and fuzzy logic
    Bhardwaj, Kartik Krishna
    Banyal, Siddhant
    Sharma, Deepak Kumar
    Al-Numay, Waleed
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2022, 79
  • [4] A New Fog-Based Transmission Scheduler on the Internet of Multimedia Things Using a Fuzzy-Based Quantum Genetic Algorithm
    Zanbouri, Kouros
    Al-Khafaji, Hamza Mohammed Ridha
    Navimipour, Nima Jafari
    Yalcin, Senay
    [J]. IEEE MULTIMEDIA, 2023, 30 (03) : 74 - 86
  • [5] An energy-aware approach for resource managing in the fog-based Internet of Things using a hybrid algorithm
    Ren, Xiaojun
    Zhang, Zhijun
    Arefzadeh, Seyedeh Maryam
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2021, 34 (01)
  • [6] A New Lightweight Routing Protocol for Internet of Mobile Things Based on Low Power and Lossy Network Using a Fuzzy-Logic Method
    Ghanbari, Zahra
    Navimipour, Nima Jafari
    Hosseinzadeh, Mehdi
    Shakeri, Hassan
    Darwesh, Aso
    [J]. PERVASIVE AND MOBILE COMPUTING, 2024, 97
  • [7] BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things
    Ali, Shayan E.
    Tariq, Noshina
    Khan, Farrukh Aslam
    Ashraf, Muhammad
    Abdul, Wadood
    Saleem, Kashif
    [J]. SENSORS, 2023, 23 (09)
  • [8] Internet of Vehicles (IoV)-Based Task Scheduling Approach Using Fuzzy Logic Technique in Fog Computing Enables Vehicular Ad Hoc Network (VANET)
    Ehtisham, Muhammad
    ul Hassan, Mahmood
    Al-Awady, Amin A.
    Ali, Abid
    Junaid, Muhammad
    Khan, Jahangir
    Abdelrahman Ali, Yahya Ali
    Akram, Muhammad
    [J]. SENSORS, 2024, 24 (03)