Using Trusted Networks to Detect Anomaly Nodes in Internet of Things

被引:0
作者
Campos, Beatriz de A. [1 ]
de Farias, Claudio M. [1 ]
Carmo, Luiz F. R. C. [1 ]
机构
[1] PPGI UFRJ, Postgrad Program Informat, Rio De Janeiro, RJ, Brazil
来源
2019 22ND INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION 2019) | 2019年
关键词
Internet Of Things; Wireless Sensor Networks; Trusted Networks; Anomaly Detection; Subjective Logic;
D O I
10.23919/fusion43075.2019.9011283
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increase of Internet of Things has insert many challenges on networks studies. This kind of network suffer with problems like wide traffic, fault and monitoring problems. Regarding this, the concept of trust has gained increasing attention on academia by its comprehensiveness through the nodes behavior such as energy consumption, data transmission, and processing time. If a node has a different behavior from its neighbours it can be considered an anomalous node. In this paper, we propose a method for identifying if nodes are anomalous, using only their own monitored data by computing trust values for each node. Also, a data compression method is applied to help reduce the network traffic. This method is capable of signaling and separating anomalous data coming from different nodes in order to maintain the lowest possible interference level due to errors, frauds or malicious attacks. Our objective is to avoid errors in a posterior phase. For trust measurement we have used Subjective Logic that has been recently explored for these purposes. Experiments demonstrate that our method is feasible and help to reduce package size and spare energy.
引用
收藏
页数:8
相关论文
共 22 条
[11]  
Josang A, 2016, ARTIF INTELL-FOUND, P1, DOI 10.1007/978-3-319-42337-1
[12]   A logic for uncertain probabilities [J].
Josang, A .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2001, 9 (03) :279-311
[13]  
Josang A., 2006, Proceedings of the 29th Australasian Computer Science Conference-Volume, P85
[14]   Using energy-efficient trust management to protect IoT networks for smart cities [J].
Khan, Zeeshan Ali .
SUSTAINABLE CITIES AND SOCIETY, 2018, 40 :1-15
[15]   A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things [J].
Khan, Zeeshan Ali ;
Herrmann, Peter .
2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, :1169-1176
[16]  
Martinsson H., 2005, EVALUATION SUBJECTIV
[17]   A new approach for the optimal synthesis of four-bar path generator linkages [J].
Romero, Neider Nadid ;
Campos, Alexandre ;
Martins, Daniel ;
Vieira, Rodrigo S. .
SN APPLIED SCIENCES, 2019, 1 (11)
[18]   Intrusion Detection System for Wireless Sensor Networks Using Danger Theory Immune-Inspired Techniques [J].
Salmon, Helio ;
de Farias, Claudio ;
Loureiro, Paula ;
Pirmez, Luci ;
Rossetto, Silvana ;
Rodrigues, Paulo ;
Pirmez, Rodrigo ;
Delicato, Flavia ;
da Costa Carmo, Luiz .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2013, 20 (01) :39-66
[19]   A novel trust mechanism based on Fog Computing in Sensor-Cloud System [J].
Wang, Tian ;
Zhang, Guangxue ;
Bhuiyan, Md Zakirul Alam ;
Liu, Anfeng ;
Jia, Weijia ;
Xie, Mande .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 :573-582
[20]   Anomaly detection in wireless sensor networks: A survey [J].
Xie, Miao ;
Han, Song ;
Tian, Biming ;
Parvin, Sazia .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) :1302-1325