Detection of Packet Dropping Attack Based on Evidence Fusion in IoT Networks

被引:1
|
作者
Ding, Weichen [1 ]
Zhai, Wenbin [1 ]
Liu, Liang [1 ]
Gu, Ying [2 ]
Gao, Hang [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Columbia Univ, Sch Engn & Appl Sci, New York, NY USA
基金
中国国家自然科学基金;
关键词
BLACK-HOLE ATTACKS; MISBEHAVIOR;
D O I
10.1155/2022/1028251
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of these attacks is the packet-dropping attack, which is very harmful. The existing packet-dropping attack detection algorithms are unsuitable for emerging resource-constrained IoT networks. For example, ML-based algorithms always inject numerous packets to obtain the training dataset. However, it is heavyweight for energy-limited nodes to forward these extra packets. In this paper, we propose a lightweight evidence fusion-based detection algorithm (EFDA), which leverages the packet forwarding evidence to identify malicious nodes. Firstly, EFDA finds the sequence numbers of dropped packets and their corresponding source nodes. Then, it traces the routing path of each dropped packet and collects evidence for detection. The evidence stored by nodes around the path record the node's forwarding behaviors. Finally, the collected evidence is fused to evaluate the trust of nodes. Based on nodes' trust, the K-means clustering is used to distinguish between malicious nodes and benign nodes. We conduct simulation experiments to compare EFDA with ML-based algorithms. The experimental results demonstrate that EFDA can detect the packet-dropping attack without injecting packets and achieve a higher detection accuracy.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] DDoS attack detection techniques in IoT networks: a survey
    Pakmehr, Amir
    Assmuth, Andreas
    Taheri, Negar
    Ghaffari, Ali
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14637 - 14668
  • [32] Malicious Attack Detection in IoT by Generative Adversarial Networks
    Srikanth Bethu
    SN Computer Science, 6 (4)
  • [33] A Cellular Intrusion Detection Framework for Packet Dropping Attacks in Wireless Sensor Networks
    Tong Xin
    Chen Lan
    Li Ying
    MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION IV, PTS 1 AND 2, 2012, 128-129 : 441 - 445
  • [34] Evidence Fusion for Malicious Bot Detection in IoT
    Chatterjee, Moitrayee
    Namin, Akbar Siami
    Datta, Prerit
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 4545 - 4548
  • [35] A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks
    Rmayti, Mohammad
    Khatoun, Rida
    Begriche, Youcef
    Khoukhi, Lyes
    Gaiti, Dominique
    COMPUTER NETWORKS, 2017, 121 : 53 - 64
  • [36] HLA SIGNATURE AND ENTROPY BASED METHOD TO DETECT MALICIOUS PACKET DROPPING ATTACK IN WANET
    Mohan, Megha Vasu
    Mohan, Megha Vasu
    Vernekar, Nagaraj K.
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 847 - 851
  • [37] Observer-based H∞ control over packet dropping networks
    Zhang Dongmei
    Wang Xingang
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2008, 19 (06) : 1215 - 1225
  • [38] Observer-based H∞ control over packet dropping networks
    Zhang Dongmei~1 Wang Xingang~2 1.Dept.of Applied Mathematics
    2.Coll.of Information Engineering
    JournalofSystemsEngineeringandElectronics, 2008, 19 (06) : 1215 - 1225
  • [39] Investigating Packet Dropping Attacks in RPL-DODAG in IoT
    Sahay, Rashmi
    Geethakumari, G.
    Mitra, Barsha
    Goyal, Naman
    2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,
  • [40] Optimal Denial-of-Service Attack Scheduling With Energy Constraint Over Packet-Dropping Networks
    Qin, Jiahu
    Li, Menglin
    Shi, Ling
    Yu, Xinghuo
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (06) : 1648 - 1663