Using Trusted Networks to Detect Anomaly Nodes in Internet of Things

被引:0
|
作者
Campos, Beatriz de A. [1 ]
de Farias, Claudio M. [1 ]
Carmo, Luiz F. R. C. [1 ]
机构
[1] PPGI UFRJ, Postgrad Program Informat, Rio De Janeiro, RJ, Brazil
关键词
Internet Of Things; Wireless Sensor Networks; Trusted Networks; Anomaly Detection; Subjective Logic;
D O I
10.23919/fusion43075.2019.9011283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of Internet of Things has insert many challenges on networks studies. This kind of network suffer with problems like wide traffic, fault and monitoring problems. Regarding this, the concept of trust has gained increasing attention on academia by its comprehensiveness through the nodes behavior such as energy consumption, data transmission, and processing time. If a node has a different behavior from its neighbours it can be considered an anomalous node. In this paper, we propose a method for identifying if nodes are anomalous, using only their own monitored data by computing trust values for each node. Also, a data compression method is applied to help reduce the network traffic. This method is capable of signaling and separating anomalous data coming from different nodes in order to maintain the lowest possible interference level due to errors, frauds or malicious attacks. Our objective is to avoid errors in a posterior phase. For trust measurement we have used Subjective Logic that has been recently explored for these purposes. Experiments demonstrate that our method is feasible and help to reduce package size and spare energy.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement
    Gong, Bei
    Wang, Yubo
    Liu, Xiangang
    Qi, Fazhi
    Sun, Zhihui
    CHINA COMMUNICATIONS, 2018, 15 (02) : 100 - 121
  • [2] A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement
    Bei Gong
    Yubo Wang
    Xiangang Liu
    Fazhi Qi
    Zhihui Sun
    中国通信, 2018, 15 (02) : 100 - 121
  • [3] A Blockchain-Based Trusted Upload Scheme for the Internet of Things Nodes
    Jiao Y.
    Wang C.
    International Journal of Crowd Science, 2022, 6 (02) : 92 - 97
  • [4] Trusted Composition of Internet of Medical Things over Imperfect Networks
    Ahmad, Ehsan
    Larson, Brian
    Banga, Abdulbasid
    FUTURE INTERNET, 2024, 16 (07)
  • [5] Anomaly detection using deep convolutional generative adversarial networks in the internet of things
    Mishra, Amit Kumar
    Paliwal, Shweta
    Srivastava, Gautam
    ISA TRANSACTIONS, 2024, 145 : 493 - 504
  • [6] A Trusted Naming Service for Things of Internet
    Jokhio, Imran Ali
    Jokhio, Sana Hoor
    Karimshaikh, Faisal
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2012, 31 (02) : 325 - 334
  • [7] Trusted measurement of behaviors for the Internet of Things
    Ye, Tao
    Ning, Zhenhu
    Zhang, Jianbiao
    Xu, Meng
    ALEXANDRIA ENGINEERING JOURNAL, 2021, 60 (01) : 1477 - 1488
  • [8] Trusted data collection for Internet of Things
    Ning, Zhenhu
    Gong, Bei
    Xu, Meng
    Zhou, Caiqiu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (10):
  • [9] Graph Neural Networks for Anomaly Detection in Industrial Internet of Things
    Wu, Yulei
    Dai, Hong-Ning
    Tang, Haina
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12) : 9214 - 9231
  • [10] Authentication Phase of Security Bootstrapping in the Internet of Things Networks Based on a Trusted Zone
    Nazemi, N.
    Manzuri, M. T.
    JOURNAL OF SCIENTIFIC & INDUSTRIAL RESEARCH, 2019, 78 (11): : 751 - 754