Detection of Packet Dropping Attack Based on Evidence Fusion in IoT Networks

被引:1
|
作者
Ding, Weichen [1 ]
Zhai, Wenbin [1 ]
Liu, Liang [1 ]
Gu, Ying [2 ]
Gao, Hang [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Peoples R China
[2] Columbia Univ, Sch Engn & Appl Sci, New York, NY USA
基金
中国国家自然科学基金;
关键词
BLACK-HOLE ATTACKS; MISBEHAVIOR;
D O I
10.1155/2022/1028251
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of these attacks is the packet-dropping attack, which is very harmful. The existing packet-dropping attack detection algorithms are unsuitable for emerging resource-constrained IoT networks. For example, ML-based algorithms always inject numerous packets to obtain the training dataset. However, it is heavyweight for energy-limited nodes to forward these extra packets. In this paper, we propose a lightweight evidence fusion-based detection algorithm (EFDA), which leverages the packet forwarding evidence to identify malicious nodes. Firstly, EFDA finds the sequence numbers of dropped packets and their corresponding source nodes. Then, it traces the routing path of each dropped packet and collects evidence for detection. The evidence stored by nodes around the path record the node's forwarding behaviors. Finally, the collected evidence is fused to evaluate the trust of nodes. Based on nodes' trust, the K-means clustering is used to distinguish between malicious nodes and benign nodes. We conduct simulation experiments to compare EFDA with ML-based algorithms. The experimental results demonstrate that EFDA can detect the packet-dropping attack without injecting packets and achieve a higher detection accuracy.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Message dropping attacks in overlay networks: Attack detection and attacker identification
    Xie, Liang
    Zhu, Sencun
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (03)
  • [22] Message dropping attacks in overlay networks: Attack detection and attacker identification
    Xie, Liang
    Zhu, Sencun
    2006 SECURECOMM AND WORKSHOPS, 2006, : 56 - +
  • [23] DoS Attack Allocation Against Remote State Estimation Over Packet-Dropping Networks
    Ye, Dan
    Mei, Mengyao
    Wei, Jiang
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2022, 69 (03) : 1507 - 1511
  • [24] RSS based multistage statistical method for attack detection and localization in IoT networks
    Saxena, Shubham
    Pandey, Ankur
    Kumar, Sudhir
    PERVASIVE AND MOBILE COMPUTING, 2022, 85
  • [25] SVM-Based Cloning and Jamming Attack Detection in IoT Sensor Networks
    Jeyaselvi, M.
    Sathya, M.
    Suchitra, S.
    Ibrahim, S. Jafar Ali
    Chakravarthy, N. S. Kalyan
    ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY AND COMPUTING, AICTC 2021, 2022, 392 : 461 - 471
  • [26] RPL-based attack detection approaches in IoT networks: review and taxonomy
    Alfriehat, Nadia
    Anbar, Mohammed
    Aladaileh, Mohammed
    Hasbullah, Iznan
    Shurbaji, Tamarah A.
    Karuppayah, Shankar
    Almomani, Ammar
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (09)
  • [27] A Hybrid-Transformer-Based Cyber-Attack Detection in IoT Networks
    Al-Halboosi, Imad Tareq
    Elbagoury, Bassant Mohamed
    El-Regaily, Salsabil Amin
    El-Horbaty, El-Sayed M.
    International Journal of Interactive Mobile Technologies, 2024, 18 (14) : 90 - 102
  • [28] Doppler-Shift-Based Sybil Attack Detection for Mobile IoT Networks
    Dogan-Tusha, Seda
    Althunibat, Saud
    Qaraqe, Marwa
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (01) : 1136 - 1147
  • [29] Entropy and Divergence-based DDoS Attack Detection System in IoT Networks
    Saiyed, Makhduma
    Al Anbagi, Irfan
    2023 19TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, WIMOB, 2023, : 224 - 230
  • [30] IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks
    Zohourian, Alireza
    Dadkhah, Sajjad
    Molyneaux, Heather
    Neto, Euclides Carlos Pinto
    Ghorbani, Ali A.
    COMPUTERS & SECURITY, 2024, 146