RETRACTED: Machine Learning Technique to Detect Sybil Attack on IoT Based Sensor Network (Retracted Article)

被引:19
作者
Mehbodniya, Abolfazl [1 ]
Webber, Julian L. [2 ]
Shabaz, Mohammad [3 ]
Mohafez, Hamidreza [4 ]
Yadav, Kusum [5 ]
机构
[1] Kuwait Coll Sci & Technol KCST, Dept Elect & Commun Engn, Doha Area, 7th Ring Rd, Kuwait, Kuwait
[2] Osaka Univ, Grad Sch Engn Sci, 1-3 Machikaneyamacho, Toyonaka, Osaka, Japan
[3] Chitkara Univ, Chitkara Univ Inst Engn & Technol, Rajpura, India
[4] Univ Malaya, Fac Engn, Dept Biomed Engn, Jalan Univ, Kuala Lumpur 50603, Malaysia
[5] Univ Hail, Coll Comp Sci & Engn, Hail, Saudi Arabia
关键词
False identity attacks; Internet of things; RPL; Sybil attacks; Wireless sensor networks; INTERNET; ROBUST;
D O I
10.1080/03772063.2021.2000509
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoT) devices is getting more and more usage rate day by day with the developments in wireless sensor networks. The heterogeneous network formed by the interconnection of all IoT devices is highly vulnerable to external attacks. Many routing protocol attacks have been put forward, and the attacks continue to increase and diversify daily. However, the proposed detection and prevention methods need to be improved and updated according to today's conditions. False identity attacks are included in the IoT network layer routing protocol (Routing Protocol for Low-Power and Lossy Network, RPL). In the type of fake identity attacks, intrusion detection based on the signal strength of the nodes is one of the most widely used and recommended methods. In resource constrained IoT devices, energy conservation and low processing load are among the most critical issues. Especially, classical methods used in attack detection may be insufficient in detecting and preventing attacks. This study proposes the packet delivery rates of nodes and the detection of fake identity attacks with machine learning approaches such as Naive Bayes, Random Forest, and Logistic Regression. Simulated identity attacks were detected with a higher success rate (92.14% accuracy) than classical methods.
引用
收藏
页数:9
相关论文
共 31 条
[1]  
Ali S, 2018, 2018 THIRD INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), P217, DOI 10.1109/FMEC.2018.8364068
[2]  
[Anonymous], RPL: IPv6 Routing Protocol for Low Power and Lossy Networks
[3]   A Sybil Resistant IoT Trust Model using Blockchains [J].
Asiri, Sarah ;
Miri, Ali .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :1017-1026
[4]  
Chatterjee I, 2021, International Journal of Modern Research, V1, P15
[5]   Robust and Secure Time-Synchronization Against Sybil Attacks for Sensor Networks [J].
Dong, Wei ;
Liu, Xiaojin .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2015, 11 (06) :1482-1491
[6]  
Evangelista D., 2016, WIRELESS DAYS WD, P1, DOI 10.1109/WD.2016.7461513
[7]  
GOYAL M, 2018, 2018 IEEE INT C SYST, P1
[8]   A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things [J].
Groves, Bryan ;
Pu, Cong .
MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
[9]  
Hadiansyah R., 2020, 2020 8 INT C INF COM, P1, DOI [10.1109/ICoICT49345.2020.9166162, DOI 10.1109/ICOICT49345.2020.9166162]
[10]   Identification of Active Attacks in Internet of Things: Joint Model- and Data-Driven Automatic Modulation Classification Approach [J].
Huang, Sai ;
Lin, Chunsheng ;
Xu, Wenjun ;
Gao, Yue ;
Feng, Zhiyong ;
Zhu, Fusheng .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (03) :2051-2065