Using Trusted Networks to Detect Anomaly Nodes in Internet of Things

被引:0
作者
Campos, Beatriz de A. [1 ]
de Farias, Claudio M. [1 ]
Carmo, Luiz F. R. C. [1 ]
机构
[1] PPGI UFRJ, Postgrad Program Informat, Rio De Janeiro, RJ, Brazil
来源
2019 22ND INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION 2019) | 2019年
关键词
Internet Of Things; Wireless Sensor Networks; Trusted Networks; Anomaly Detection; Subjective Logic;
D O I
10.23919/fusion43075.2019.9011283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of Internet of Things has insert many challenges on networks studies. This kind of network suffer with problems like wide traffic, fault and monitoring problems. Regarding this, the concept of trust has gained increasing attention on academia by its comprehensiveness through the nodes behavior such as energy consumption, data transmission, and processing time. If a node has a different behavior from its neighbours it can be considered an anomalous node. In this paper, we propose a method for identifying if nodes are anomalous, using only their own monitored data by computing trust values for each node. Also, a data compression method is applied to help reduce the network traffic. This method is capable of signaling and separating anomalous data coming from different nodes in order to maintain the lowest possible interference level due to errors, frauds or malicious attacks. Our objective is to avoid errors in a posterior phase. For trust measurement we have used Subjective Logic that has been recently explored for these purposes. Experiments demonstrate that our method is feasible and help to reduce package size and spare energy.
引用
收藏
页数:8
相关论文
共 22 条
[1]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[2]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[3]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[4]  
[Anonymous], 2018, Esp8266ex datasheet
[5]   An enhanced bootstrap method to detect possible fraudulent behavior in testing facilities [J].
de Souza, Rosembergue P. ;
Carmo, Luiz F. R. C. ;
Pirmez, Luci .
ACCREDITATION AND QUALITY ASSURANCE, 2017, 22 (01) :21-27
[6]   On the Lifetime of Wireless Sensor Networks [J].
Dietrich, Isabel ;
Dressler, Falko .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (01)
[7]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660
[8]   A survey of trust computation models for service management in internet of things systems [J].
Guo, Jia ;
Chen, Ing-Ray ;
Tsai, Jeffrey J. P. .
COMPUTER COMMUNICATIONS, 2017, 97 :1-14
[9]   An adaptive sinkhole aware algorithm in wireless sensor networks [J].
Jahandoust, Ghazaleh ;
Ghassemi, Fatemeh .
AD HOC NETWORKS, 2017, 59 :24-34
[10]   Multi-agent trust-based intrusion detection scheme for wireless sensor networks [J].
Jin, Xianji ;
Liang, Jianquan ;
Tong, Weiming ;
Lu, Lei ;
Li, Zhongwei .
COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 :262-273